Data Access For Cloud Users Using Strong Token Authentication

Ali Hussain, Reetu Gupta
unpublished
Cloud computing is the latest trend in computing by which various services, applications and other computing things can be delivered as a service. Cloud computing is a new flexible approach for providing higher computational power in shared medium. It provides the distributed model based on self evaluating techniques to improve the processing capabilities of the system with lesser managerial concerns. It is made up of client, application, platform, servers and infrastructures. This computing
more » ... el delivers computation capabilities as a calculated service from above components to end users. Though a wide variety of devices and their integration are concerned, priority of handling security will go down. As the users of cloud is increasing day by day, one need to handle the data, system and confidentiality issues carefully. With this work[17], the aim is to make the application level of security provided by any of the servers or provide more effectively and according to the users need. For achieving the confidentiality attribute based encryption is used. Digital signature and multi factor authentication like single sign on one (SSO) are some of their examples. They should be delivered as a service so that multiple small scale companies might also integrate them to serve their users in a better way. Multiple authentication mechanisms, like digital signatures, certificates or 2-factor security and several identity validators can coexist and can be combined to suite the most complex needs. So a new security model must be added along with existing system to provide authenticated access of authorized data in a cloud environment. Also the type of users & their accessing medium is an outside world and due to that the unauthorized changes in the system may occur. We have proposed an new security approach in [17] to increase the level of security in cloud storage system. In this paper we trying to evaluate the proposed approach[17] on various parameters of evaluation and its effect on the resource consumption of cloud infrastructure.
fatcat:5wj7coi6j5dd5pdurjck62zky4