IJMTES – TWO FACTOR DATA SECURITY MECHANISM IN CLOUD COMPUTING

Journal Title : International Journal of Modern Trends in Engineering and Science

Paper Title : TWO FACTOR DATA SECURITY MECHANISM IN CLOUD COMPUTING

Author’s Name : S Dhanasekar | P Sujitha | P Shreenidhi | N Vishalakshi | R Sasirekhaunnamed

Volume 04 Issue 03 2017

ISSN no:  2348-3121

Page no: 138-140

Abstract – In this paper, we propose a security protection mechanism using two factor for cloud storage system. Our system allows a person to send an encrypted message through a cloud storage server .The receiver needs two things in order to decrypt the cipher text. The first is secret key stored in the computer. The thing is a unique personal security device which connects to the computer. It is not possible to decrypt the cipher text without either piece. Once the security device is lost, this device is revoked. It cannot be used to decrypt any cipher text. This can be done by the cloud server which changes the existing cipher text to be undecryptable by this device. This process is completely visible to the sender. The security and efficiency analysis show that our system is secure as well as practical.

KeywordsTwo Storage, Cloud, Security, Data, System, Factor

Reference

  1. S. S. M. Chow, Y. J. He, L. C. K. Hui, and S.-M. Yiu, “SPICE –
    Simple Privacy-Preserving Identity-Management for Cloud Environment,” in Applied Cryptography and Network Security – ACNS 2012, ser. LNCS, Vol.7341. Springer, 2012, pp. 526–543.
  2. L. Hardesty, “Secure computers aren’t so secure,” MIT press, 2009,http://www.physorg.com/news176107396.html.
  3. C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy Preserving Public Auditing for Secure Cloud Storage,” IEEE Trans.Computers, vol. 62, no. 2, pp. 362–375, 2013.
  4. B. Wang, S. S. M. Chow, M. Li, and H. Li, “Storing Shared Data On the Cloud via Security-Mediator,” in International Conference On Distributed Computing Systems – ICDCS 2013. IEEE, 2013.