A MULTILEVEL USER VALIDATION FRAMEWORK FOR ACCESSING CLOUD SERVICES

Authors

  • Swetha Gadde
  • Janaki K

Keywords:

Cloud Data Security, Cloud User Validation, Multi Level user Validation, Digital Unique Authentication Identity, Unauthorized User Identification, Validation Accuracy.

Abstract

Cloud computing is a paradigm that offers enormous advantages to cloud users for example, huge memory, adaptable processing abilities, security to the data and boundless registering capabilities. To utilize the maximum capacity of Cloud computing, information is moved, handled and stored by Cloud Service Providers (CSP). Be that as it may, information owners are suspicious to put their information in cloud that is outside their own control. The main issue with Cloud computing is the manner by which to provide the security and protection of cloud user information being prepared and additionally stored in a Cloud computing condition. With regards to cloud information assurance, the techniques utilized can be fundamentally the same as ensuring information inside a conventional server group. To perform user validation for accessing cloud services, a strong cryptography method is introduced along with a multi factor verification process. Moving information into the cloud implies that the clients have less authority over their information, this implies the cloud clients must believe the CSP to secure the information from both outside and inside attacks. In the proposed work, a Multi Level User Authentication (MLUA) framework is introduced for accessing cloud services. The unauthorized users are not allowed to access cloud resources. The cloud user, data owner and cloud service providers are involved in multi factor authentication. The CSP will generate a Digital Unique Authentication Identity (DUAI) number along with general verification for undergoing multi level verification process. The proposed method is compared with the traditional methods and the results show that the proposed method is better in performance and accuracy in identification of valid cloud users.

References

. Jignesh S, The 6 multi cloud architecture designer for an effective cloud. https://simform.com/multi-cloud-architecture. 15 Apr 2018.

. Tweaks C, Importance of cloud computing interoperabilitiy. https://cloudtweaks.com/2013/10/importance-of-interoperability- providerlockin. Accessed 15 Nov 2018.

. Zkik Ornahou, Elhajji S (2017) Secure mobile multi cloud architecture for authentication and data storage. Int J Cloud Appl Comput 7(2):213–230.

. Y. Zhang, Q. Chen, and S. Zhong, “Privacy-preserving data aggregation in mobile phone sensing,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 5, pp. 980–992, 2016.

. H. Kwon, C. Hahn, D. Koo, and J. Hur, “Scalable and reliable key management for secure deduplication in cloud storage,” in Proceedings of the IEEE 10th International Conference on Cloud Computing (CLOUD), Honolulu, HI, USA, June 2017.

. K. V. Pradeep and V. Vijayakumar, “Survey on the key management for securing the cloud,” Procedia Computer Science, vol. 50, 2015.

. Z. E. Dawahdeh, S. N. Yaakob, and A. M. Sagheer, “Modified ElGamal elliptic curve cryptosystem using hexadecimal representation,” Indian Journal of Science and Technology, vol. 8, no. 15, pp. 1–8, 2015.

. R. Buchade and R. Ingle, “Key management for cloud data storage: methods and comparisons,” 2014.

. Arepalli, Gopi & Erukula, Suresh & Gopi, A.P. & Nagaraju, Chiluka. (2016). Secure multicast routing protocol in MANETs using efficient ECGDH algorithm. International Journal of Electrical and Computer Engineering (IJECE). 6. 1857-1865. 10.11591/ijece.v6i4.9941.

. K. Sarada, V. Lakshman Narayana,(2020), “Improving Relevant Text Extraction Accuracy using Clustering Methods”, TEST Engineering and Management, Volume 83, Page Number: 15212 – 15219.

. K. Sarada, V. Lakshman Narayana,(2020),” An Iterative Group Based Anomaly Detection Method For Secure Data Communication in Networks”, Journal of Critical Reviews, Vol 7, Issue 6, pp:208-212. doi: 10.31838/jcr.07.06.39.

. Banavathu Mounika, P. Anusha, V. Lakshman Narayana,(2020), “ Use of BlockChain Technology In Providing Security During Data Sharing”, Journal of Critical Reviews, Vol 7, Issue 6, pp:338-343. doi: 10.31838/jcr.07.06.59.

. V. Lakshman Narayana, B. Naga Sudheer,(2020),” Fuzzy Base Artificial Neural Network Model For Text Extraction From Images”, Journal of Critical Reviews, Vol 7, Issue 6,pp:350-354, doi: 10.31838/jcr.07.06.61.

. V. Lakshman Narayana, A. Peda Gopi,(2020),” Accurate Identification And Detection Of Outliers In Networks Using Group Random Forest Methodoly”, Journal of Critical Reviews, Vol 7, Issue 6,pp:381-384, doi: 10.31838/jcr.07.06.67.

. Sandhya Pasala, V. Pavani, G. Vidya Lakshmi, V. Lakshman Narayana,(2020),” Identification Of Attackers Using Blockchain Transactions Using Cryptography Methods”, Journal of Critical Reviews,

Vol 7, Issue 6,pp:368-375, doi: 10.31838/jcr.07.06.65

. C.R.Bharathi, Vejendla. Lakshman Narayana , L.V. Ramesh, (2020),” Secure Data Communication Using Internet of Things”, International Journal of Scientific & Technology Research, Volume 9, Issue 04,pp:3516-3520.

. H. Dinh, A. Dworkin, C. O’Neill et al., “Omnibox: Efficient cloud storage by evaluating dropbox and box,” in Proceedings of the 2017 24th International Conference on Telecommunications (ICT) IEEE, Limassol, Cyprus, May 2017.

. Indu, P. M. Rubesh Anand, and S. P. Shaji, “Secure file sharing mechanism and key management for the mobile cloud computing environment,” IJST, vol. 9, 2016.

. Armando, R. Carbone, L. Compagna, J. Cuéllar, G. Pellegrino, and

A. Sorniotti, “An authentication flaw in browser-based single sign-on protocols: impact and remediations,” Computers & Security, vol. 33, pp. 41–58, 2013.

Downloads

Published

2021-06-30

How to Cite

Gadde, S. ., & K, J. . (2021). A MULTILEVEL USER VALIDATION FRAMEWORK FOR ACCESSING CLOUD SERVICES. The Journal of Contemporary Issues in Business and Government, 27(3), 1936–1947. Retrieved from https://cibgp.com/au/index.php/1323-6903/article/view/1800