An Improved Authentication Technique with OTP in Cloud Computing
Keywords:
Cloud computing security, Authentication, OTP, Dynamic Password, Time Synchronization, Information and communication security, TrustAbstract
Today data security plays an important role in the field of software and quality of service, Cloud computing focuses a new challenging security threats. Therefore, a data security model must solve the most challenges of cloud computing security. Cloud computing is a capable technology to make easy development of large-scale, on-demand, flexible computing infrastructures. The concept of cloud computing has changed the view of infrastructure architectures, software delivery and development models. Cloud computing incorporates elements from grid computing, utility computing and autonomic computing to an innovative deployment architecture. This paper presents an overview and the study of the cloud computing. Also include the several security and challenging issues, emerging application and the future trends of cloud computing. To overcome this I use the concept of Mobile OTP for providing authentication, whose purpose is to ensure security in cloud environment.
References
A. Kundu, C. D. Banerjee, P. Saha, “Introducing New Services in Cloud Computing Environment”, International Journal of Digital Content Technology and its Applications, AICIT, Vol. 4, No. 5, pp. 143-152, 2010.
B. Rajkumar, C. Yeo, S. Venugopal, S. Malpani, Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems (2009).
Pring et al., “Forecast: Sizing the cloud; understanding the opportunities in cloud services,” Gartner Inc., Tech. Rep. G00166525, March 2009.
S. Subashini, V. Kavitha, “A survey on security issues in service delivery models of cloud computing”; Journal of Network and Computer Applications, Vol. 34(1), pp 1–11, Academic Press Ltd., UK, 2011, ISSN: 1084-8045.
V. Krishna Reddy, B. Thirumal Rao, Dr. L.S.S. Reddy, P.Sai Kiran “Research Issues in Cloud Computing “ Global Journal of Computer Science and Technology, Volume 11, Issue 11, July 2011.
Shivlal Mewada, Umesh Kumar Singh and Pradeep Kumar Sharma, " A Novel Security Based Model for Wireless Mesh Networks”, ISROSET- IJSRNSC, Vol-1, Issue-1, pp(11-15), March-April 2013.
Shivlal Mewada, Umesh Kumar Singh, Pradeep Sharma,“Security Based Model for Cloud Computing”, Int. Journal of Computer Networks and Wireless Communications (IJCNWC), Vol. 1, No. 1, pp (13-19), December 2011.
Rajesh Piplode, et al. , “Study of Threats, Risk and Challenges in Cloud Computing”, IJSRCSE Vol-1, issue-1 pp (26-30) Jan- Feb 2013
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.