SlideShare una empresa de Scribd logo
1 de 23
Fine-grained Two-factor Access Control for
Web-based Cloud Computing Services
ABSTRACT
 A new fine-grained two-factor authentication (2FA)
access control system for web-based cloud computing
services has been proposed.
 In our proposed 2FA access control system, an attribute-
based access control mechanism is implemented with the
necessity of both user secret key and a lightweight
security device.
 As a user cannot access the system if s/he does not hold
both, the mechanism can enhance the security of the
system, especially in those scenarios where many users
share the same computer for web-based cloud services.
LITERATURE SURVEY
InterCloud: Utility-Oriented Federation of Cloud
Computing Environments for Scaling of
Application Services
• Cloud computing providers have setup several data
centers at different geographical locations over the
Internet in order to optimally serve needs of their
customers around the world
• The Cloud computing providers are unable to predict
geographic distribution of users consuming their
services, hence the load coordination must happen
automatically,
 The overall goal is to create a computing
environment that supports dynamic expansion or
contraction of capabilities
 using the CloudSim toolkit The results demonstrate
that federated Cloud computing model has immense
potential as it offers significant performance gains as
regards to response time and cost saving under
dynamic workload scenarios.
ADVANTAGES & DISADVANATGES
ADVANTAGES:
 Scalable architecture and frequent data accessibility.
 Fast access of data.
 Data can be accessed from anywhere in the world.
DISADVANATGES:
 Complexity occurs for large number of data to
maintain.
 Too much load can crash the whole system and
flow of data
(2) Characterizing Task Usage Shapes in Google’s
Compute Clusters:
 The increase in scale and complexity of large compute clusters
motivates a need for representative workload benchmarks to
evaluate the performance impact of system changes
 The goal is to find an accurate characterization that can
faithfully reproduce the performance of historical workload
traces in terms of key performance metrics
 Through experiments using workload traces from Google
production clusters, we find that simply using the mean of
task usage can generate synthetic work-load traces that
accurately reproduce resource utilizations and task waiting
time
ADVANATAGES & DISADVANATAGES
ADVANATGES:
 Advance security measiures like 2-step verification
was introduced.
 Less chances of system failure or data loss.
 High security measures.
DISADVANATGES:
 Hard for users to use this system because of its
complexity
 Time Consuming process.
(3) An Analysis of Traces from a Production
MapReduce Cluster:
 MapReduce is a programming paradigm for parallel
processing that is increasingly being used for data-
intensive applications in cloud computing environments
 The service provider can use this knowledge to make
better scheduling decisions
 We use an instance-based learning technique that
exploits temporal locality to predict job completion times
from historical data and identify potential performance
problems in our dataset.
ADVANATAGES & DISADAVANATGES
ADVANTAGES:
 Step by step verifications required for users to prove
their identity and Cluster based data maintenance
 High security measures
DISADVANATAGES:
 Hard to clear the authentication process
 Time consuming
(4) Characterization of Hadoop Jobs Using
Unsupervised Learning:
 Apache Hadoop, is increasingly being used for data-
intensive applications in cloud computing
environments.
 MapReduce environments benefits both the cloud
service providers and their users.
 metrics and job configuration features such as
format of the input/output files, type of compression
used etc to find similarity among Hadoop jobs
ADVANATGES & DISADVANTAGES
ADVANTAGES:
 Random Key methodology is implemented for
signature verification
 Handling of huge amount of data is possible
 Ease of use
DISADVANATGES:
 Possibility of guessing the key structure is high.
 Less secure when compared to other methods
(5) An approach for characterizing workloads
in Google cloud to derive Realistic resource
utilization models:
 Analyzing behavioral patterns of workloads is critical
to understanding Cloud computing environments.
 the first large-scale analysis of real-world Cloud data,
using a recently released dataset that features traces
from over 12,000 servers over the period of a month.
 The derived model assists in understanding the
relationship between users and tasks within
workload, and enables further work
ADVANTAGES & DISADVANTAGES
ADVANATGES:
 Providing data maintenance based on the existing
model based architecture.
 Large scale processing and analysis of cloud data
DISADVANTAGES:
 Lack of privacy occurs, if the user search goes larger
and fully depends on third party server
 Hackers can easily steal data from the users.
(6) Workload classification & software energy
measurement for efficient scheduling on private
cloud platforms:
 At present there are a number of barriers to creating an
energy efficient workload scheduler for a Private Cloud
based data center.
 The effect of different workloads on server power
consumption in a Private Cloud platform.
 display a noticeable difference in energy consumption
when servers are given tasks that dominate various
resources (CPU, Memory, Hard Disk and Network)
ADVANATAGES & DISADVANATGES
ADVANATAGES:
 Measurement based cloud architecture and resource
is handled by the private cloud.
 Better performance by the servers.
DISADVANATAGES:
 The approach is proposed purely based on existing
models, so the success and failure rates depend on
the existing system.
 There are not much of any improvements in the
security or any levels of cloud system.
(7) An Efficient File Hierarchy Attribute-Based
Encryption Scheme in Cloud Computing:
 Ciphertext-policy attribute-based encryption (CP-
ABE) has been a preferred encryption technology to
solve the challenging problem of secure data sharing
in cloud computing
 an efficient file hierarchy attribute-based encryption
scheme is proposed in cloud computing.
 both ciphertext storage and time cost of encryption
are saved
ADVANATAGES & DISADVANATAGES
ADAVANATGES:
 Layered access structures are integrated into a single
structure in CP-ABE.
 Very high level of encryption and security of data
DISADVANATAGES:
 The shared data files generally have the
characteristic of multilevel hierarchy.
 It can cause errors in data processing.
(8) Intrusion-Resilience via the Bounded-Storage
Model:
 New methords are used to preserve the protocols from
the malicious program
 The security of our protocols relies on the assumption
that the amount of data that the adversary can transfer
from the infected machine is limited
 This method is based on the results from the
BoundedStorage Model
 This type of software can be secretly attached to
seemingly harmless programs, or can be installed by
worms or viruses.
ADVANATAGES & DISADVANATAGES
ADVANATAGES:
 Intrusion-resilience in the cryptographic protocols
by session-key generation and entity authentication.
 High level of security for protection of data.
DISADAVANATAGES:
 The main drawback of our protocols is that during
the intrusion the virus can impersonate the user
 The user might be annoyed by the whole setup
process
(9) SMS-based One-Time Passwords: Attacks
and Defence:
 SMS-based One-Time Passwords (SMS OTP) were
introduced to online bank transaction prevent from
theft
 analyze the security architecture of SMS OTP
systems and study attacks that pose a threat to
Internet-based authentication and authorization
services
 Mechanisms to secure SMS OTPs against common
attacks and specifically against smartphone Trojans
ADVANATAGES & DISADVANTAGES
ADVANTAGES:
 The OTP will only be received in the registered number
of the User which no other have access.
 The OTP’s will only be valid for limited amount of time.
 The randomly generated OTP will not be guessable.
DISADVANATAGES:
 Delay in receiving OTP when there are any network
problems
 The main drawback of this method is OTP can stolen by
a person with whom one work in a profession.
(10) Securing online bank transaction from phishing
attacks using MFA And secure session key:
 Phishing is an online criminal activity using the collection of
social engineering methods such as messages and emails
 The strong techniques are required to avoid phishing attacks
 Multi Factor Authentication (MFA) and secure session key
generation using Gaussian distribution to reduce the attacks
 Authentication technique authenticates the users using user's
signature image recognition and secret question answer.
 session key generated using Gaussian distribution is sent to
user's mobile phone
ADVANATAGES & DISADAVANTAGES
ADVANATAGES:
 Multi Factor Authentication (MFA) and secure session
key generation using Gaussian distribution to reduce the
attacks caused by the phishers
 Multiple levels of security measures available for
protection of data from hackers.
DISADVANATAGES:
 Deceptive phishing attacks, false emails are sent to the
user’s inbox are still threat
 Users are prone to fraud activities by hackers and data
can be stolen by such fraudulent measures.

Más contenido relacionado

La actualidad más candente

Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageIJSRD
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagekitechsolutions
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Girish Chandra
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storageLeMeniz Infotech
 
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan Holt
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsKamal Spring
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 reportsuthi
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
IRJET- Developing an Algorithm to Detect Malware in Cloud
IRJET- Developing an Algorithm to Detect Malware in CloudIRJET- Developing an Algorithm to Detect Malware in Cloud
IRJET- Developing an Algorithm to Detect Malware in CloudIRJET Journal
 
Distributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloudDistributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloudChanakya Chandu
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Shakas Technologies
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 

La actualidad más candente (19)

Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storage
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_Presentation
 
Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 report
 
Final review presentation
Final review presentationFinal review presentation
Final review presentation
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
IRJET- Developing an Algorithm to Detect Malware in Cloud
IRJET- Developing an Algorithm to Detect Malware in CloudIRJET- Developing an Algorithm to Detect Malware in Cloud
IRJET- Developing an Algorithm to Detect Malware in Cloud
 
Distributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloudDistributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloud
 
Observability
ObservabilityObservability
Observability
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 

Similar a Fine-grained Two-Factor Access Control for Cloud Services

Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageShakas Technologies
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Dr. Richard Otieno
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Jishnu Pradeep
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsIRJET Journal
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...IEEEGLOBALSOFTTECHNOLOGIES
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...IEEEGLOBALSOFTTECHNOLOGIES
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageIEEEFINALYEARPROJECTS
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageJPINFOTECH JAYAPRAKASH
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...IRJET Journal
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital ForensicIRJET Journal
 

Similar a Fine-grained Two-Factor Access Control for Cloud Services (20)

Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 

Último

Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Último (20)

Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Fine-grained Two-Factor Access Control for Cloud Services

  • 1. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
  • 2. ABSTRACT  A new fine-grained two-factor authentication (2FA) access control system for web-based cloud computing services has been proposed.  In our proposed 2FA access control system, an attribute- based access control mechanism is implemented with the necessity of both user secret key and a lightweight security device.  As a user cannot access the system if s/he does not hold both, the mechanism can enhance the security of the system, especially in those scenarios where many users share the same computer for web-based cloud services.
  • 3. LITERATURE SURVEY InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services • Cloud computing providers have setup several data centers at different geographical locations over the Internet in order to optimally serve needs of their customers around the world • The Cloud computing providers are unable to predict geographic distribution of users consuming their services, hence the load coordination must happen automatically,
  • 4.  The overall goal is to create a computing environment that supports dynamic expansion or contraction of capabilities  using the CloudSim toolkit The results demonstrate that federated Cloud computing model has immense potential as it offers significant performance gains as regards to response time and cost saving under dynamic workload scenarios.
  • 5. ADVANTAGES & DISADVANATGES ADVANTAGES:  Scalable architecture and frequent data accessibility.  Fast access of data.  Data can be accessed from anywhere in the world. DISADVANATGES:  Complexity occurs for large number of data to maintain.  Too much load can crash the whole system and flow of data
  • 6. (2) Characterizing Task Usage Shapes in Google’s Compute Clusters:  The increase in scale and complexity of large compute clusters motivates a need for representative workload benchmarks to evaluate the performance impact of system changes  The goal is to find an accurate characterization that can faithfully reproduce the performance of historical workload traces in terms of key performance metrics  Through experiments using workload traces from Google production clusters, we find that simply using the mean of task usage can generate synthetic work-load traces that accurately reproduce resource utilizations and task waiting time
  • 7. ADVANATAGES & DISADVANATAGES ADVANATGES:  Advance security measiures like 2-step verification was introduced.  Less chances of system failure or data loss.  High security measures. DISADVANATGES:  Hard for users to use this system because of its complexity  Time Consuming process.
  • 8. (3) An Analysis of Traces from a Production MapReduce Cluster:  MapReduce is a programming paradigm for parallel processing that is increasingly being used for data- intensive applications in cloud computing environments  The service provider can use this knowledge to make better scheduling decisions  We use an instance-based learning technique that exploits temporal locality to predict job completion times from historical data and identify potential performance problems in our dataset.
  • 9. ADVANATAGES & DISADAVANATGES ADVANTAGES:  Step by step verifications required for users to prove their identity and Cluster based data maintenance  High security measures DISADVANATAGES:  Hard to clear the authentication process  Time consuming
  • 10. (4) Characterization of Hadoop Jobs Using Unsupervised Learning:  Apache Hadoop, is increasingly being used for data- intensive applications in cloud computing environments.  MapReduce environments benefits both the cloud service providers and their users.  metrics and job configuration features such as format of the input/output files, type of compression used etc to find similarity among Hadoop jobs
  • 11. ADVANATGES & DISADVANTAGES ADVANTAGES:  Random Key methodology is implemented for signature verification  Handling of huge amount of data is possible  Ease of use DISADVANATGES:  Possibility of guessing the key structure is high.  Less secure when compared to other methods
  • 12. (5) An approach for characterizing workloads in Google cloud to derive Realistic resource utilization models:  Analyzing behavioral patterns of workloads is critical to understanding Cloud computing environments.  the first large-scale analysis of real-world Cloud data, using a recently released dataset that features traces from over 12,000 servers over the period of a month.  The derived model assists in understanding the relationship between users and tasks within workload, and enables further work
  • 13. ADVANTAGES & DISADVANTAGES ADVANATGES:  Providing data maintenance based on the existing model based architecture.  Large scale processing and analysis of cloud data DISADVANTAGES:  Lack of privacy occurs, if the user search goes larger and fully depends on third party server  Hackers can easily steal data from the users.
  • 14. (6) Workload classification & software energy measurement for efficient scheduling on private cloud platforms:  At present there are a number of barriers to creating an energy efficient workload scheduler for a Private Cloud based data center.  The effect of different workloads on server power consumption in a Private Cloud platform.  display a noticeable difference in energy consumption when servers are given tasks that dominate various resources (CPU, Memory, Hard Disk and Network)
  • 15. ADVANATAGES & DISADVANATGES ADVANATAGES:  Measurement based cloud architecture and resource is handled by the private cloud.  Better performance by the servers. DISADVANATAGES:  The approach is proposed purely based on existing models, so the success and failure rates depend on the existing system.  There are not much of any improvements in the security or any levels of cloud system.
  • 16. (7) An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing:  Ciphertext-policy attribute-based encryption (CP- ABE) has been a preferred encryption technology to solve the challenging problem of secure data sharing in cloud computing  an efficient file hierarchy attribute-based encryption scheme is proposed in cloud computing.  both ciphertext storage and time cost of encryption are saved
  • 17. ADVANATAGES & DISADVANATAGES ADAVANATGES:  Layered access structures are integrated into a single structure in CP-ABE.  Very high level of encryption and security of data DISADVANATAGES:  The shared data files generally have the characteristic of multilevel hierarchy.  It can cause errors in data processing.
  • 18. (8) Intrusion-Resilience via the Bounded-Storage Model:  New methords are used to preserve the protocols from the malicious program  The security of our protocols relies on the assumption that the amount of data that the adversary can transfer from the infected machine is limited  This method is based on the results from the BoundedStorage Model  This type of software can be secretly attached to seemingly harmless programs, or can be installed by worms or viruses.
  • 19. ADVANATAGES & DISADVANATAGES ADVANATAGES:  Intrusion-resilience in the cryptographic protocols by session-key generation and entity authentication.  High level of security for protection of data. DISADAVANATAGES:  The main drawback of our protocols is that during the intrusion the virus can impersonate the user  The user might be annoyed by the whole setup process
  • 20. (9) SMS-based One-Time Passwords: Attacks and Defence:  SMS-based One-Time Passwords (SMS OTP) were introduced to online bank transaction prevent from theft  analyze the security architecture of SMS OTP systems and study attacks that pose a threat to Internet-based authentication and authorization services  Mechanisms to secure SMS OTPs against common attacks and specifically against smartphone Trojans
  • 21. ADVANATAGES & DISADVANTAGES ADVANTAGES:  The OTP will only be received in the registered number of the User which no other have access.  The OTP’s will only be valid for limited amount of time.  The randomly generated OTP will not be guessable. DISADVANATAGES:  Delay in receiving OTP when there are any network problems  The main drawback of this method is OTP can stolen by a person with whom one work in a profession.
  • 22. (10) Securing online bank transaction from phishing attacks using MFA And secure session key:  Phishing is an online criminal activity using the collection of social engineering methods such as messages and emails  The strong techniques are required to avoid phishing attacks  Multi Factor Authentication (MFA) and secure session key generation using Gaussian distribution to reduce the attacks  Authentication technique authenticates the users using user's signature image recognition and secret question answer.  session key generated using Gaussian distribution is sent to user's mobile phone
  • 23. ADVANATAGES & DISADAVANTAGES ADVANATAGES:  Multi Factor Authentication (MFA) and secure session key generation using Gaussian distribution to reduce the attacks caused by the phishers  Multiple levels of security measures available for protection of data from hackers. DISADVANATAGES:  Deceptive phishing attacks, false emails are sent to the user’s inbox are still threat  Users are prone to fraud activities by hackers and data can be stolen by such fraudulent measures.