Data Security in Cloud Computing Using Three-Factor Authentication
- 32 Downloads
Cloud storage is tremendously increasing its services, huge range of storage and communication of massive data over network. This practically has an adverse effect on the way of upholding this data, when it especially comes to the privacy of the user-secured and highly confidential data. We first view you with a system that is vulnerable to this authentication protocol with its misuse of biometrics and incorrect password generates no user to lost the mobile device. We even went along with this scheme and gave out a major issue to overcome with impersonation attack. However, this scheme makes the way easy to attack for offline password guessing attack. We included a three-factor authentication which carries the smart card into card reader, gets the password and identity and conveys the user details’ requesting time. We then came up with a scheme to overcome these security flaws of this prescribed authentication scheme combining passwords, mobile devices and biometrics. The proposed system is robust three-factor authentication with the help of password, biometrics and mobile device which provides reliable security strength to the user’s data and makes counterattack to existing attack, giving with more benefits compared to the previous scheme. This scheme will not only encounters with the security issues, but also provides with most enhanced security functionalities.
KeywordsThree-factor authentication Counter attacks Privacy Biometrics Smart cards
This work was supported by the KL University Centre for Computer Science Students—an industry research collaborated laboratory under the guidance of N. Sunanda, Asst. Professor, KL University.
- 2.Jiang, Q., Ma, J., Wei, F.: On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J. (2018)Google Scholar
- 3.Jiang, Q., Khan, M.K., Lu, X., Ma, J., He, D.: A privacy preserving three-factor authentication protocol for e-health clouds. J. Supercomput. (2016)Google Scholar
- 4.Cybernetics approaches in intelligent systems. Springer Science and Business Media LLC (2018)Google Scholar
- 5.He, D., Zeadally, S., Kumar, N., Lee, J.H.: Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. (2016)Google Scholar
- 6.Jiang, Q., Kumar, N., Ma, J., Shen, J., He, D., Chilamkurti, N.: A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks. Int. J. Netw. Manag. (2017)Google Scholar
- 7.Vinod, A.R.: Hindering data theft attack through fog computing. Int. J. Res. Eng. Technol. (2014)Google Scholar
- 8.Praveena, A., Smys, S.: Ensuring data security in cloud based social networks. In: 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), vol. 2, pp. 289–295. IEEE, 2017Google Scholar
- 9.Karthiban, K., Smys, S.: Privacy preserving approaches in cloud computing. In: 2018 2nd International Conference on Inventive Systems and Control (ICISC), pp. 462–467. IEEE, 2018Google Scholar