Multilevel Authentication based Data Security and Verification over Cloud Computing Environment

Full Text (PDF, 508KB), PP.56-68

Views: 0 Downloads: 0

Author(s)

Deepak Soni 1,* Nishchol Mishra 1

1. School of Information Technology, RGPV University Bhopal

* Corresponding author.

DOI: https://doi.org/10.5815/ijeme.2017.05.06

Received: 1 Jan. 2017 / Revised: 24 Feb. 2017 / Accepted: 28 Mar. 2017 / Published: 8 Sep. 2017

Index Terms

AES, IDEA, SAES, SHA-2, Blowfish, Hash key, Data Privacy, Data Security

Abstract

There are various algorithm proposed in the area of cloud computing environment. Now a days the cloud computing is the very interesting area for research purpose. Cloud computing environment provides the security of user data and integrity verification with the users data, also cloud provide on demand network access to a shared pool of configurable computing resources like network, servers, storage, applications and services that can be rapidly provisioned and provide with minimum user effort and service provider interaction. Uses of cloud computing services is very easy and also in very low cost. The cloud computing services are on demand over the internet, so it provides the facility to clients that access these services remotely from anywhere, anytime with the help of internet and any devices like pc, laptop mobiles etc. The data or information of cloud user is save in cloud service provider so in the cloud computing environment the security of data and privacy of data is primary issue[1]. In this paper a security model is proposed here we provide a mechanism to cloud user to encrypt their data or sensitive information and generate a integrity verification key then save the data on cloud in encrypted form. The cloud user have many choices like private phase, public phase and hybrid phase and the hybrid phase tier1 and tier 2. In all three sections there are various encryption techniques are implemented like AES (Advanced Encryption Scheme)[9], IDEA, Blowfish[12], And SAES based on the security factors namely authentication, confidentiality, security, privacy, non-repudiation and integrity. In Private phase a Unique token generation mechanism with the help of SHA-2 implemented it helps to ensure the authenticity of the user, The Hybrid section of the model provides On Demand Security Choices Tier one or Tier two and Public section provides faster execution with the help of Blowfish algorithm. Overall the user data Is wrapped in two folds of encryption and integrity verification in all sections.

Cite This Paper

Deepak Soni, Nishchol Mishra,"Multilevel Authentication based Data Security and Verification over Cloud Computing Environment", International Journal of Education and Management Engineering(IJEME), Vol.7, No.5, pp.56-68, 2017. DOI: 10.5815/ijeme.2017.05.06

Reference

[1]Mandeep Kaur, and Manish Mahajan, “Implementing Various Encryption Algorithms to -Enhance The Data Security of Cloud in Cloud Computing”, International Journal of Computer Science &Information Technology Volume: 2, pp. 831-835, 2012.

[2]Wood K, Pereira E. (Nov.2010) 'An Investigation into CLoud Configuration and Security', 2010 International Conference for Internet Technology and Secured Transactions, 1-6.

[3]Expert Group Report, K. Jeffery [ERCIM], B. Neidecker-Lutz [SAP Research]: “The Future of Cloud Computing: Opportunities for European Cloud Computing Beyond “2010 (2010)Elsevier.

[4]Syed rizvi, Katie cover, Christopher gates, “A trusted third party(TTP) based encryption scheme for ensuring data confidentiality in cloud environment”, Procedia Computer Science 36 ( 2014 ) 381 – 386, Elsevier.

[5]Robert P. McEvoy, Francis M. Crowe Colin, CMurphyWilliam Marnane Optimisation of the SHA-2 Family of Hash Functions on FPGAs” March 2, 2006. ISBN: 0-7695-2533-4 pp: 317-322 Elsevair.

[6]Musa, M., Schaefer, E. F., and Wedig, S. 2003. ”A Simplified AES Algorithm and its Linear and Differential Cryptanalysis,” Cryptologia 27(2), 148 - 177.

[7]Krešimir Popović, Željko Hocenski” Cloud computing security issues and challenges” MIPRO 2010, May 24-28, 2010, Opatija, Croatia.

[8]Ranjit Kaur, Raminder Pal Singh ”Enhanced Cloud Computing Security andIntegrity Verification via Novel Encryption Techniques” 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[9]Stallings, W. 2002. ”The Advanced Encryption Standard,” Cryptologia 26(3), 165 - 188. University of Texas.

[10]Anthony T.Velte, Toby J.Velte, Robert Elsenpeter” Cloud Computing A Practical    Approach”, TATA McGRAW-HILL Edition 2010.

[11]Mr. Bhavesh Rahulkar#1, Mr. Praveen Shende#2” Data Encryption by Blowfish Encryption Algorithm to Protect Data in Public Cloud" International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 E-ISSN: 2321-9637.

[12]Bruce Schneier, Dr. Dobb's” The Blowfish Encryption Algorithm” Journal, v.19, n. 4, April 1994, pp. 38-40.

[13]G. Manikandanet al., “A Hybrid Approach for Security Enhancement by Modified Crypto-Stegno Scheme”, European Journal of Scientific Research, Vol. 2, pp: 206-212, 2011.

[14]Manpreet kaur, Hardeep Singh “A Review of Cloud Computing Security Issues” I.J. Education and Management Engineering, 2015, 5, 32-41.

[15]Published Online October 2015 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijeme.2015.05.04.

[16]Sumit Goyal “Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review” International Journal of Computer Network and Information Security(IJCNIS) ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)  DOI: 10.5815/ijcnis Published By: MECS Publisher.

[17]Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem” Innovative Method for Enhancing Key Generation and Management in the AES-Algorithm” International Journal of Computer Network and Information Security(IJCNIS) ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online) DOI: 10.5815/ijcnisPublished By: MECS Publisher.

[18]Seyyed Yasser hashemi, Parisa Sheykhi Hesarlo” Security, Privacy and Trust Challenges in Cloud Computing and Solutions” I.J. Computer Network and Information Security, 2014, 8, 34-40.

[19]Published Online July 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2014.08.05.