International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 165 - Number 4 |
Year of Publication: 2017 |
Authors: A. Anusha Priya, R. Gunasundari |
10.5120/ijca2017913844 |
A. Anusha Priya, R. Gunasundari . Securing Data on the Cloud Server by the User Authentication and Data Security Techniques. International Journal of Computer Applications. 165, 4 ( May 2017), 6-12. DOI=10.5120/ijca2017913844
Cloud computing is a model which offers a large number of applications under the different topologies. It is the technology of building a strong data security between the Cloud Service Provider (CSP) and User. Authentication is a direct need of an each and every organization and so it is becoming supreme necessary for an organization not because it copes only with the security threats but the reason to develop the policies, procedures and appliances that provide administrative, physical and logical security. Whenever a distinct request to access to a pool of resources, to use them or update them as desired, then to authenticate such an individual is denoted as an authentication. Securing data is always of vital importance because of the serious nature of the Cloud Computing and large amounts of complex data it carries, the need is also equally important. In this paper, the user authentication on the cloud server can be developed by implementing the different types of authentication methods. The three metric based, of bio metric authentication improve the authentication process on the cloud server which protects the data from the unauthorized users. The data in the cloud storage can be protected by implementing data security algorithms such as RSA and AES. The security algorithms can perform very well to protect the data in the cloud server.