Tuesday, 22 Oct, 2019

011-28082485

011-47044510

+91-9899775880

Security Enhanced Multi Level Authentication for Cloud

International Journal of Distributed and Cloud Computing

Volume 1 Issue 2

Published: 2013
Author(s) Name: Vishal Vijay Saswade, S. M. Bansode | Author(s) Affiliation: Assistant Professor, CSE Department, Government Engineering College, Aurangabad, Maharshtra, India
Locked Subscribed Available for All

Abstract

Cloud Computing provide a delivery of scalable IT resources over the Internet as opposed to hosting and operating those resources locally such as on a college or university network. Resources like applications and services, as well as the infrastructure on which they operate. Cloud providers specialize in particular applications and services, and this expertise allows them to efficiently manage resources like applications and services, expertise allows them to efficiently manage, upgrades and maintenance, backups, disaster recovery and Failure functions upgrasources locally, such as on a college or uscalable IT rdes and maintenance, backups, disaster recovery, and failover functions. Cloud computing [1] encourages IT organizations and providers to increase standardization of protocols and processes so that the many pieces of the cloud computing [1] model can interoperate properly and efficiently. Concern about identity theft, data breaches and fraud is increasing but at the same time organizations are feeling pressure to enable employees, partners and customers to access more sensitive information from anywhere and any device. These market dynamics make multi-factor authentication [4] and fraud prevention critical parts of any organization’s security[2] strategy Cloud computing has been around for over some years in different forms. However the third generation trend in IT industry is now ruled over by cloud computing. Cloud services require Attestation and different models of Attestation have been proposed over the years. Two Factor Attestation technique contains a two layer Attestation system, where the first layer contains user name and password and second layer contains tokens and pins.

Keywords: Cloud Computing, SEMAM, User Authentication, PAAS

View PDF

Refund policy | Privacy policy | Copyright Information | Contact Us | Feedback © Publishingindia.com, All rights reserved