An Improved Authentication Technique with OTP in Cloud Computing

Authors

  • Vishal Paranjape Paranjape Department of Information Technology, Gyan Ganga College of Technology Jabalpur, M.P., India
  • Vimmi Pandey Department of Information Technology, Gyan Ganga College of Technology Jabalpur, M.P., India

Keywords:

Cloud computing security, Authentication, OTP, Dynamic Password, Time Synchronization, Information and communication security, Trust

Abstract

Today data security plays an important role in the field of software and quality of service, Cloud computing focuses a new challenging security threats. Therefore, a data security model must solve the most challenges of cloud computing security. Cloud computing is a capable technology to make easy development of large-scale, on-demand, flexible computing infrastructures. The concept of cloud computing has changed the view of infrastructure architectures, software delivery and development models. Cloud computing incorporates elements from grid computing, utility computing and autonomic computing to an innovative deployment architecture. This paper presents an overview and the study of the cloud computing. Also include the several security and challenging issues, emerging application and the future trends of cloud computing. To overcome this I use the concept of Mobile OTP for providing authentication, whose purpose is to ensure security in cloud environment.

 

References

A. Kundu, C. D. Banerjee, P. Saha, “Introducing New Services in Cloud Computing Environment”, International Journal of Digital Content Technology and its Applications, AICIT, Vol. 4, No. 5, pp. 143-152, 2010.

B. Rajkumar, C. Yeo, S. Venugopal, S. Malpani, Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems (2009).

Pring et al., “Forecast: Sizing the cloud; understanding the opportunities in cloud services,” Gartner Inc., Tech. Rep. G00166525, March 2009.

S. Subashini, V. Kavitha, “A survey on security issues in service delivery models of cloud computing”; Journal of Network and Computer Applications, Vol. 34(1), pp 1–11, Academic Press Ltd., UK, 2011, ISSN: 1084-8045.

V. Krishna Reddy, B. Thirumal Rao, Dr. L.S.S. Reddy, P.Sai Kiran “Research Issues in Cloud Computing “ Global Journal of Computer Science and Technology, Volume 11, Issue 11, July 2011.

Shivlal Mewada, Umesh Kumar Singh and Pradeep Kumar Sharma, " A Novel Security Based Model for Wireless Mesh Networks”, ISROSET- IJSRNSC, Vol-1, Issue-1, pp(11-15), March-April 2013.

Shivlal Mewada, Umesh Kumar Singh, Pradeep Sharma,“Security Based Model for Cloud Computing”, Int. Journal of Computer Networks and Wireless Communications (IJCNWC), Vol. 1, No. 1, pp (13-19), December 2011.

Rajesh Piplode, et al. , “Study of Threats, Risk and Challenges in Cloud Computing”, IJSRCSE Vol-1, issue-1 pp (26-30) Jan- Feb 2013

Downloads

Published

2013-06-30

How to Cite

[1]
V. P. Paranjape and V. Pandey, “An Improved Authentication Technique with OTP in Cloud Computing”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 1, no. 3, pp. 22–26, Jun. 2013.

Issue

Section

Research Article

Similar Articles

<< < 10 11 12 13 14 15 16 17 18 19 > >> 

You may also start an advanced similarity search for this article.