CFP last date
20 January 2025
Reseach Article

Attribute based Multifactor Authentication for Cloud Applications

by T. Lakshmi Praveena, V. Ramachandran, Ch. Rupa
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 80 - Number 17
Year of Publication: 2013
Authors: T. Lakshmi Praveena, V. Ramachandran, Ch. Rupa
10.5120/13971-1474

T. Lakshmi Praveena, V. Ramachandran, Ch. Rupa . Attribute based Multifactor Authentication for Cloud Applications. International Journal of Computer Applications. 80, 17 ( October 2013), 37-40. DOI=10.5120/13971-1474

@article{ 10.5120/13971-1474,
author = { T. Lakshmi Praveena, V. Ramachandran, Ch. Rupa },
title = { Attribute based Multifactor Authentication for Cloud Applications },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 80 },
number = { 17 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 37-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume80/number17/13971-1474/ },
doi = { 10.5120/13971-1474 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:54:49.517947+05:30
%A T. Lakshmi Praveena
%A V. Ramachandran
%A Ch. Rupa
%T Attribute based Multifactor Authentication for Cloud Applications
%J International Journal of Computer Applications
%@ 0975-8887
%V 80
%N 17
%P 37-40
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Online information maintenance through cloud applications allows users to store, manage, control and share their information with other users as well as Cloud service providers. There have been serious privacy concerns about outsourcing user information to cloud servers. But also due to an increasing number of cloud data security incidents happened in recent years. Proposed system is a privacy-preserving system using Attribute based Multifactor Authentication. Proposed system provides privacy to users data with efficient authentication and store them on cloud servers such that servers do not have access to sensitive user information. Meanwhile users can maintain full control over access to their uploaded ?les and data, by assigning ?ne-grained, attribute-based access privileges to selected files and data, while di?erent users can have access to di?erent parts of the System. This application allows clients to set privileges to different users to access their data.

References
  1. Bhargav-Spantzel, A. , Squicciarini, A. C, Bertino, E. : Establishing and Protecting Digital Identity in Federation Systems. Journal of Computer Security, IOSPress, 14(3), pp. 269–300, (2006)
  2. Choi, N. , Song, I. Y. , Han, H. : A survey on ontology mapping. SIGMOD Record 35, (3), pp. 34–41.
  3. Falcon, http://iws. seu. edu. cn/projects/matching/
  4. Y. Kalfoglou, and M. Schorlemmer. "Ontology mapping: the state of the art. " The Knowledge Engineering Review, 18(1), pp. 1–31, (2003).
  5. Pedersen, T. P. : Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. Advances inCryptology, Proc. CRYPTO '91, pp. 129–140, (1991).
  6. WordNet, http://wordnet. princeton. edu/
  7. White paper: AEP Smartgate Security, Strong Multi Factor User Authentication for secure information sharing, white paper, AEP Networks, December 1998, http://www. aepnetworks. com/products/downloads
  8. Jae-Jung Kim* and Seng-Phil HongA Method of Risk Assessment for Multi-Factor Authentication, Journal of Information Processing Systems, Vol. 7, No. 1, March 2011 DOI : 10. 3745/JIPS. 2011. 7. 1. 187
  9. Ming Li Member, IEEE, Shucheng Yu, Member, IEEE, Yao Zheng, Student Member, IEEE, Kui Ren, Senior Member, IEEE, and Wenjing Lou, Senior Member, IEEE,Scalable and Secure Sharing of Personal Health Records in Cloud computing using Attribute-based Encryption, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS VOL. XX, NO. XX, XX 2012
  10. Elisa Bertino , Federica Paci , Rodolfo Ferrini , Ning Shang ,Privacy-preserving Digital Identity Management for Cloud Computing, Copyright 2009 IEEE, Bulletin of the IEEE Computer Society Technical Committee on Data Engineering
  11. Behrouz A. Forouzan, Cryptography & Network security,TATA McGraw Hill .
Index Terms

Computer Science
Information Sciences

Keywords

Multifactor authentication Digital Identity Management Zero Knowledge Proof Protocol Inter cloud authentication SAAS ElGamal.