Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Access Control for Cloud Computing Through Secure OTP Logging as Services

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Priyanka Patel, Nirmal Gaud
10.5120/ijca2016909801

Priyanka Patel and Nirmal Gaud. Access Control for Cloud Computing Through Secure OTP Logging as Services. International Journal of Computer Applications 141(14):1-5, May 2016. BibTeX

@article{10.5120/ijca2016909801,
	author = {Priyanka Patel and Nirmal Gaud},
	title = {Access Control for Cloud Computing Through Secure OTP Logging as Services},
	journal = {International Journal of Computer Applications},
	issue_date = {May 2016},
	volume = {141},
	number = {14},
	month = {May},
	year = {2016},
	issn = {0975-8887},
	pages = {1-5},
	numpages = {5},
	url = {http://www.ijcaonline.org/archives/volume141/number14/24849-2016909801},
	doi = {10.5120/ijca2016909801},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

And non-linear interpolation. The empirical evaluation shows that the proposed system is better than current Access control mechanism is very important phase over internet based services. Cloud computing is internet based service application provide variety of services such as IaaS, PaaS and SaaS. For the accessing of cloud services cloud service provider provide user login information in terms of username and password. The login information is easy hacked and cracked by other party and the security strength of cloud computing is decreases. Now days some authors used dual authentication mode in terms of mail conformation and one time password. The one time password increase the security strength of access control over cloud computing. In this paper proposed a secured authentication system based on secured OTP based logging system in cloud computing environment. The proposed algorithm is a combination of hash algorithm system.

References

  1. Eko Sediyono , Kartika Imam Santoso ,Suhartono “Secure Login by Using One-time Password Authentication Based on MD5 Hash Encrypted SMS” IEEE 2013 PP1604 -1608.
  2. Antony G. Robertiello, Kiran A. Bandla “Attacks on MD5 Hashed Passwords” ECE GMU 2005 PP 1-14.
  3. Vimmi Pandey “Securing the Cloud Environment Using OTP” International Journal of Scientific Research in Computer Science and Engineering PP 38-43.
  4. Shams Zawoad, Amit Kumar Dutta, and Ragib Hasan “Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service” IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL-13, 2016. Pp 148-162.
  5. CHEN Yanli, SONG Lingling, YANG Geng “Attribute-Based Access Control for Multi-Authority system with constant size ciphertext in cloud computing” China communication, 2016. Pp 146-162.
  6. Yuan BaoLi “Research on the Security Management Method of Cloud Computing Authorized User Based on Anonymous OTP” 5th International Conference on Computer Sciences and Automation, 2015. Pp 1-4.
  7. Ankush Kudale, Binod Kumar “Protected Authentication by Login Credential and OTP for Cloud Based Application” International Journal of Computer Application, Vol-5, 2015. Pp 42-48.
  8. Indrajit Das, Ria das “Mobile Security (OTP) by Cloud Computing” , IJIET, 2013. Pp 284-300.
  9. Pranav Parikh, Murat Kantarcioglu, Vaibhav Khadilkar, Bhavani Thuraisingham, Latifur Khan “secure information integration with a semantic web-based framework” IEEE, 2012. Pp 659-666.
  10. Mohd Fawzi Al-Hunaity, Jawdat Alshaer, Osama Dorgham, Hussam Farraj “Security Model for Communication and Exchanging Data in Mobile Cloud Computing” International Journal of Computer Trends and Technology, Vol-30, 2015. Pp 138-146.
  11. Vishal Paranjape, Vimmi Pandey “An Approach towards Security in Private Cloud Using OTP” International Journal of Emerging Technology and Advanced Engineering, Vol-3, 2013. Pp 683-687.
  12. Soorat Hussain “Access Control in Cloud Computing Environment” Int. J. Advanced Networking and Applications, Vol-5, 2014. Pp 2011-2015.
  13. Ankita Patil, Kiran Zambare, Preeti Yadav, Pankaj Wasulkar “Secure File Access Using Md5 For One Time Password Generation On Cloud” IJEEBS Pp 345-348.
  14. Kenneth G. Paterson ,Douglas Stebila “One-time-password-authenticated key exchange (full version)” 2010 IACR Pp 1-18.
  15. D.Parameswari , L.Jose “SET with SMS OTP using Two Factor Authentication JSA” 2011 Pp 106-112.
  16. Uma Tejaswi, Srilatha.B IJESC “Web Security with OTP by Using Android Mobile” 2015. Pp 831-835.
  17. Mohammed Alzomai Audun Jøsang “The Mobile Phone as a Multi OTP Device Using Trusted Computing” IEEE 2010. Pp 75-82.
  18. T.Venkat Narayana Rao, Vedavathi K “Authentication Using Mobile Phone as a Security Token” IJCSET 2011. Pp 569-574.

Keywords

Cloud Computing, OTP, Hash Function, Access Control