![]() Insecure management of identities and their access can cause a lot of trouble for organizations and individuals, resulting in data breaches, and noncompliance with important standards and regulations (such as HIPAA, PCI- DSS, EU GDPR) and inability to access resources, services and critical data. Past incidents with LastPass, Google and Evernote, where a number of user accounts were compromised show how challenging it is to protect digital identities. The digital identities that individuals and organizations use, in order to access cloud resources, are one of the main areas at risk. In recent years, cloud technologies have introduced new methods to attack organizations and individuals, broadening their threat landscape. The responsibility is shared, however, the provider must ensure that their infrastructure is secure and their clients data and applications are protected, while the user must take measure to fortify their applications and use strong passwords and authentication measures. Security concerns associated with cloud computing fall into two broad categories: security issues faced by cloud providers (organizations providing software, platform, or infrastructure- as- a -service via the cloud) and security issues faced by their customers. Therefore, a strong framework should be proposed that provides identity management, mutual exclusion and session key establishment between users and cloud server.Ĭloud computing and storage provides users with capabilities to store and process their data in third party data -centers, organizations use the cloud in a variety of different service models (such as SaaS, PaaS, IaaS) and deployment models ( private, public, hybrid). There are various security issues concerned with cloud computing out of which identity management and access management seems to be the most crucial one. Keywords- Cloud computing, identity management, OTP (one time password), two-factor authentication, password generator.Ĭloud computing, often referred to as simply the cloud, is the delivery of on demand computing resources- everything from applications to data centers over the Furthermore, security analysis realizes the feasibility of the proposed framework for cloud computing and achieves efficiency. In order to achieve better security than the alphanumerical password, the proposed model describes a scheme which allows strengthening the authentication process in the cloud environment using the password generator module by means of a combination of different technologies such as multi- factor authentication, one time password and The user enters his credentials and an image to generate an OTP. A user can change his/her password, whenever demanded. The proposed framework uses a strong password generator algorithm to generate one -time password, providing identity management, mutual authentication, session key establishment between the users and the cloud server. ![]() In this regard, this paper focuses on presenting a strong user authentication framework for cloud computing, where user legitimacy is strongly verified before entering into the cloud. However, strong user authentication is the paramount requirement for cloud computing that restrict illegal access of cloud server. So this basically means we are using the vendors services and also storing our data on his storage which means the server has to ensure tight security.Īs the geography of computation is moving towards corporate server rooms, it bring more issues including security, such as visualization security, distributed computing, application security, identity management, access control and authentication. In cloud computing, there is a third party service provider also called the vendor who provides various services through the network( Internet) and these services can be availed on a subscription basis. Sedevizo Kielienyu Master Of Compute Science University of Ottawa, Ottawa,Ībstract- Cloud computing is a type of computing of using remote servers hosted on the Internet to store, manage and process data rather than a local server or a personal computer. in Computer Science and Technology Department of Computer Science and Technology Indian Institute of Engineering Science and Technology, Shibpur Howrah-711103, West Bengal, Indiaĭepartment of Computer Science and Engineering National Institute Of Technology, Nagaland Dimapur-797112,Nagaland, India A Strong Password Generator for user Authentication in Cloud ComputingĮch.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |