CFP last date
20 December 2024
Reseach Article

Key Factor Authentication and Access Control for Accessing Cloud Computing Services

by S. Eswari, S. Manikandan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 151 - Number 4
Year of Publication: 2016
Authors: S. Eswari, S. Manikandan
10.5120/ijca2016911743

S. Eswari, S. Manikandan . Key Factor Authentication and Access Control for Accessing Cloud Computing Services. International Journal of Computer Applications. 151, 4 ( Oct 2016), 35-41. DOI=10.5120/ijca2016911743

@article{ 10.5120/ijca2016911743,
author = { S. Eswari, S. Manikandan },
title = { Key Factor Authentication and Access Control for Accessing Cloud Computing Services },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2016 },
volume = { 151 },
number = { 4 },
month = { Oct },
year = { 2016 },
issn = { 0975-8887 },
pages = { 35-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume151/number4/26224-2016911743/ },
doi = { 10.5120/ijca2016911743 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:56:14.605066+05:30
%A S. Eswari
%A S. Manikandan
%T Key Factor Authentication and Access Control for Accessing Cloud Computing Services
%J International Journal of Computer Applications
%@ 0975-8887
%V 151
%N 4
%P 35-41
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, the new algorithm named Key Factor Authentication and Access Control (KFAAC) is used to ensure the security and access control of cloud services from the clients. Cloud and Web services becoming more popular in recent days. Instead of using offline applications peoples intended to use online applications and services with updated features with recent crisis. Providing best services to the client is becoming a major role for cloud service providers. In the same time better access restriction and authentication policy should be preserved. This proposed system Key Factor Authentication and Access Control provide better access security for the cloud clients. It uses Key Encryption Scheme to validate client to ensure their uniqueness. KFA is implemented and tested under cloud environment and it shows better access control and security.

References
  1. Chunsheng Zhu, Student Member, IEEE, Hasen Nicanfar, Student Member, IEEE, Victor C. M. Leung, Fellow, IEEE, and Laurence T. Yang, Member, IEEE, “An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, OCTOBER 2014.
  2. Jia-Lun Tsai and Nai-Wei Lo, “ A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services”, IEEE SYSTEMS JOURNAL, 2015.
  3. Xin Lin, Jianliang Xu, Senior Member, IEEE, Haibo Hu, and Wang-Chien Lee, “Authenticating Location-Based Skyline Queries in Arbitrary Subspaces”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 26, NO. 6, JUNE 2014.
  4. Yinan Jing, Member, IEEE, Ling Hu, Wei-Shinn Ku, Senior Member, IEEE, and Cyrus Shahabi, “Authentication of k Nearest Neighbor Query on Road Networks”, Yinan Jing, Member, IEEE, Ling Hu, Wei-Shinn Ku, Senior Member, IEEE, and Cyrus Shahabi.
  5. Ismail Butun, Melike Erol-Kantarci, Burak Kantarci, and Houbing Song, “Cloud-Centric Multi-Level Authentication as a Service for Secure Public Safety Device Networks”, Public Safety Networks, 2016.
  6. Yong Yu, Yannan Li, Jianbing Ni, Guomin Yang, Yi Mu and Willy Susilo, “Comments on Public Integrity Auditing for Dynamic Data Sharing with Multi-user Modification”, IEEE Transactions on Information Forensics and Security, 2015.
  7. Xinyi Huang, Joseph K. Liu , Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou, “Cost-Effective Authentic and Anonymous Data Sharing with Forward Security”, IEEE Transactions on Computers, 2013.
  8. Sushmita Ruj, Member, IEEE, Milos Stojmenovic, Member, IEEE, and Amiya Nayak, Senior Member, IEEE, “Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014.
  9. Qian Wang, Student Member, IEEE, Cong Wang, Student Member, IEEE, Kui Ren, Member, IEEE,Wenjing Lou, Senior Member, IEEE, and Jin Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 5, MAY 2011.
  10. Smitha Sundareswaran, Anna C. Squicciarini, Member, IEEE, and Dan Lin, “Ensuring Distributed Accountability for Data Sharing in the Cloud”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 4, JULY/AUGUST 2012.
  11. Roberto Tamassia, Fellow, IEEE, Danfeng Yao, Member, IEEE, and William H. Winsborough, “Independently Verifiable Decentralized Role-Based Delegation”, IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART A: SYSTEMS AND HUMANS, VOL. 40, NO. 6, NOVEMBER 2010.
  12. Tsz Hon Yuen, Joseph K. Liu , Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou, “k -times Attribute-Based Anonymous Access Control for Cloud Computing”, IEEE Transactions on Computers, 2013.
  13. Shuanghe Peng, Zhige Chen, Deen Chen, “Membership Proof and Verification in Authenticated Skip Lists Based on Heap”, S ECURITY S CHEMES AND S OLUTIONS, 2016.
  14. Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, Senior Member, IEEE, and Jinjun Chen, Senior Member, IEEE, “MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud”, IEEE TRANSACTIONS ON COMPUTERS, 2013.
  15. Igor Faynberg, Hui-Lan Lu, and Herbert Ristock, “On Dynamic Access Control in Web 2.0 and Beyond: Trends and Technologies”, 2011.
  16. Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong, Fatos Xhafa, “OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices”, IEEE Transactions on Cloud Computing, 2013.
  17. Jiawei Yuan, Shucheng Yu, Member, IEEE, “Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification”, IEEE Transactions on Information Forensics and Security, 2013.
  18. Danan Thilakanathan, Shiping Chen, Surya Nepal and Rafael Calvo, “SafeProtect: Controlled Data Sharing with User-Defined Policies in Cloud-based Collaborative Environment”, JOURNAL OF L A TEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012.
  19. Luca Ferretti, Fabio Pierazzi, Michele Colajanni, and Mirco Marchetti, “Scalable architecture for multi-user encrypted SQL operations on cloud database services”, IEEE Transactions on Cloud Computing, 2013.
  20. Fei Chen, Tao Xiang, Yuanyuan Yang, and Sherman S. M. Chow, “Secure Cloud Storage Meets with Secure Network Coding”, IEEE Transactions on Computers, 2015.
  21. Indrajit Ray, Kirill Belyaev, Mikhail Strizhov, Dieudonne Mulamba, and Mariappan Rajaram, “Secure Logging As a Service—Delegating Log Management to the Cloud”, IEEE SYSTEMS JOURNAL, 2011.
  22. Gongjun Yan, Ding Wen, Stephan Olariu, and Michele C. Weigle, “Security Challenges in Vehicular Cloud Computing”, IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 14, NO. 1, MARCH 2013.
  23. Honggang Wang, University of Massachusetts Shaoen Wu, Ball State University Min Chen, Huazhong University of Science and Technology Wei Wang, South Dakota State University, “Security Protection between Users and the Mobile Media Cloud”, IEEE Communications Magazine, March 2014.
  24. Hong Liu, Student Member, IEEE, Huansheng Ning, Senior Member, IEEE, Qingxu Xiong, Member, IEEE, and Laurence T. Yang, Member, IEEE, “Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing”, IEEE Transactions on Parallel and Distributed Systems, 2013.
  25. Slawomir Grzonkowski and Peter M. Corcoran, Fellow, IEEE, “Sharing Cloud Services: User Authentication for Social Enhancement of Home Networking”, IEEE Transactions on Consumer Electronics, Vol. 57, No. 3, August 2011.
  26. T.Thamarai selvan,Glidersoft, "Nadi Aridhal: A pulse based automated diagnostic system",Electronics Computer Technology (ICECT), 2011 3rd International Conference,April 2011.
  27. Ling Hu, Student Member, IEEE, Wei-Shinn Ku, Senior Member, IEEE, Spiridon Bakiras, and Cyrus Shahabi, Senior Member, IEEE, “Spatial Query Integrity with Voronoi Neighbors”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 25, NO. 4, APRIL 2013.
  28. IBRAHIM LAHMER AND NING ZHANG, “Towards a Virtual Domain Based Authentication on MapReduce”, 2016.
Index Terms

Computer Science
Information Sciences

Keywords

Access Control Web services Cloud Security DES encryption privacy preserving authentication Cloud Service security.