Document 2 8blt 20022017

Page 1

ISSN (ONLINE): 2454-9762 ISSN (PRINT): 2454-9762 Available online at www.ijarmate.com International Journal of Advanced Research in Management, Architecture, Technology and Engineering (IJARMATE) Vol. 3, Issue 2, February 2017

Accessing Data from Cloud using Password Authentication Scheme Pankaj Lathar1, Dr.Yudhvir Singh2 and Dr.Girish Kumar Sharma3 1

Research Scholar, Dept. of Computer Science & Engineering, University Institute of Engineering & Technology, M.D. University, Rohtak-124001 2 Associate Professor, Dept. of Computer Science & Engineering, University Institute of Engineering & Technology, M.D. University,Rohtak-124001 3

Associate Professor & Head, P.G. Dept. of Computer Science, Bhai Parmanand Institute of Business Studies,Shakarpur,Delhi-110092.(Govt. of NCT Delhi) GGSIP University

vendors. Keeping this in mind, the paper

Abstract Cloud computing is wide technology that provides

services

either

hardware

or

application services on demand. These services are used by customers to perform

introduces an authentication technique by generating password at client end. It prevents third party from accessing data at client end.

their tasks. The customers are getting

Index terms

addicted to these flexible, scalable and pay

Authentication, cloud computing, cloud

per use services provided by different cloud

security and password generation

1. INTRODUCTION Cloud computing is an amalgation of

data access, data segregation, lack of trust,

various technologies like grid computing,

lack of virtualization & verification of

ubiquitous computing, services oriented

identity and signatures. All those issues need

architecture (SOA) and many more [1]. The

to be reduced so as to make secure data

technology is alluring various organizations

access from cloud. The paper devised a

and companies to use their application

technique of securing data by generating

oriented services and perform tasks in lesser

OTP (One time Password) at client side.

time. Since it utilizes services from various areas, so it must provide some security mechanisms to prevent loss of data from untrusted sites and vendors. Various cloud privacy problems are related to industry like

The following paper is organized as follow: section2 presents various studies and their failures in context of cloud authentication. Section 3 describes proposed password authentication scheme. It also presents

All Rights Reserved Š 2017 IJARMATE

43


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.