Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 6, June 2017
Two Factor Access Control for Dynamic Group in the Cloud Environment
Deokate Rakhi N., S. V. Todkari
As cloud computing share resources over the network, security is the basic concern. Data owners store their data on external servers so data confidentiality, authentication, access control are some of the basic issue in cloud environment. To protect users privacy traditional method use for authentication username and password. But this security mechanism is not secure at all the proposed method i.e. identification of users are using an two factor authentication mechanism for cloud access gives better security than the traditional one. In this proposed methodology, an efficient access mechanism using capability list is introduced.. An important feature of cloud storage is data sharing. Sharing along with strong protection of data is the main aspect.
Keywords: Terms-access control, authentication, confidentiality
Edition: Volume 6 Issue 6, June 2017
Pages: 940 - 943
How to Cite this Article?
Deokate Rakhi N., S. V. Todkari, "Two Factor Access Control for Dynamic Group in the Cloud Environment", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20173919, Volume 6 Issue 6, June 2017, 940 - 943
129 PDF Views | 106 PDF Downloads
Similar Articles with Keyword 'authentication'
Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Analysis of Protective Mechanism in Roaming Network for Secure Communication
Ashwini A. Lokhande, Sonali U. Nimbhorkar
A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
Accountability of Data usage in Cloud Computing
Nitin P. Doiphode, Hemlata Channe
A Survey on Existing Password Storage Methods and their Security
Samruddhi Patil, Kumud Wasnik
Similar Articles with Keyword 'confidentiality'
Investigation of Security in Cloud Computing
A Survey on Deduplication Scheme in Cloud Storage
Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation
Rashmi Kadu, Sonali Patil
Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines
Uma Maheswari.T, Dr.V. Kavitha
Multilevel Cryptosystem for Authorized Deduplication in Hybrid Cloud
P. Narasimhulu, Jayavarthini.C