Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 6, June 2017
Two Factor Access Control for Dynamic Group in the Cloud Environment
Deokate Rakhi N., S. V. Todkari
As cloud computing share resources over the network, security is the basic concern. Data owners store their data on external servers so data confidentiality, authentication, access control are some of the basic issue in cloud environment. To protect users privacy traditional method use for authentication username and password. But this security mechanism is not secure at all the proposed method i.e. identification of users are using an two factor authentication mechanism for cloud access gives better security than the traditional one. In this proposed methodology, an efficient access mechanism using capability list is introduced.. An important feature of cloud storage is data sharing. Sharing along with strong protection of data is the main aspect.
Keywords: Terms-access control, authentication, confidentiality
Edition: Volume 6 Issue 6, June 2017
Pages: 940 - 943
How to Cite this Article?
Deokate Rakhi N., S. V. Todkari, "Two Factor Access Control for Dynamic Group in the Cloud Environment", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20173919, Volume 6 Issue 6, June 2017, 940 - 943
129 PDF Views | 106 PDF Downloads
Similar Articles with Keyword 'authentication'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2234 - 2237Analysis of Protective Mechanism in Roaming Network for Secure Communication
Ashwini A. Lokhande, Sonali U. Nimbhorkar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1845 - 1848A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2483 - 2487Accountability of Data usage in Cloud Computing
Nitin P. Doiphode, Hemlata Channe
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017
Pages: 1760 - 1762A Survey on Existing Password Storage Methods and their Security
Samruddhi Patil, Kumud Wasnik
Similar Articles with Keyword 'confidentiality'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2457 - 2462Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation
Rashmi Kadu, Sonali Patil
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1640 - 1647Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines
Uma Maheswari.T, Dr.V. Kavitha
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 1258 - 1261Multilevel Cryptosystem for Authorized Deduplication in Hybrid Cloud
P. Narasimhulu, Jayavarthini.C