Securing the Cloud Environment Using OTP

Authors

  • Vimmi Pandey Gyan Ganga College of Technology, Jabalpur, Madhya Pradesh, India

Keywords:

One Time Password, MD5 Algorithm, Website Security, Authentication, Mobile Token

Abstract

In today’s scenario, websites have been converted from just a display of information into an online transaction in the form of goods, services, or money. Along with development, the security of the website is also need to be tightened, not just rely on usernames and passwords but also to the dynamic code of the mobile token which is difficult to be cracked. Dynamic mobile token is an application which is planted in the mobile phone to generate a code that was formed by the method of one time password and can only be used for one login session or transaction. Each mobile token has a value in the "secret" variable that makes it unique or different from the others, to separate one user access transactions or personal page.

References

Dr. Mark D. Bedworth PhD BSc FSS. February 2008. A Theory of Probabilistic One-Time Password. Computer Science Computer Engineering and Applied Computing, Security and Management.

Kiddo. 2010. Hacking Website: Menemukan Celah Keamanan & Melindungi Website dari Serangan Hacker. Mediakita

Rivest, Ronald L. 1992.The MD5 Message Digest Algorithm.

Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, “ Security Enhancement in Cloud Computing (CC)”, IJSRCSE, Volume-01 , Issue-01, Page No : 31-37 3013

Rajesh Piplode, Pradeep Sharma and Umesh Kumar Singh , “Study of Threats, Risk and Challenges in Cloud Computing”, IJSRCSE, Volume-01 , Issue-01, Page No : 26- 30, 2013

Vishal Paranjape and Vimmi Pandey’ “ An Improved Authentication Technique with OTP in Cloud Computing” IJSRCSE, Volume-01 , Issue-03, Page No : 22-26, 2013

“Privacy and consumer risks in cloud computing”, Dan Svantesson, Roger Clarke, computer law & security review 26 (2010 ) 391e97, @ 2010 Svantesson & Clarke. Published by Elsevier Ltd. doi:10.1016/j.clsr.2010.05.005.

N. Haller, Bellcore, and C. Metz. 1996. A One-Time Password System. Kaman Sciences Corporation.

Fadi Aloul, Syed Zahidi, Wassim El-Hajj. 2009. Two Factor Authentication Using Mobile Phones. Digital Library Telkom Institute of Technology (IEEE).

Arya Sapoetra Y. June 2010. Rancang Bangun Arsitektur Library Sistem Autentikasi One Time Password Menggunakan Prosedur Challenge-Response. Informatics Engineering, Pembangunan Nasional “Veteran” University, East Java.

C.W. Lin, J. J. Shen, and M. S. Hwang, "Security enhancement for optimal strong password authentication protocol," ACM Operating Systems Review, vol. 37, no. 2, pp. 7-12, April 2003.

“Dynamic Authentication: Need than a Choice”, A. Saxena, Communication Systems Software and Middleware and Workshops, 2008. COMSWARE 2008. 3rd International Conference, 10 (1) (2008), 214, IEEE conference.

“Eliminating Vulnerable Attacks Using One-Time Password and PassText – Analytical Study of Blended Schema” M. Viju Prakash, P. Alwin Infant and S. Jeya Shobana, IJCA Proceedings on International Conference on VLSI, Communications and Instrumentation (ICVCI) (2):35–41, 2011. Published by Foundation of Computer Science.

Downloads

Published

2013-08-30

How to Cite

[1]
V. Pandey, “Securing the Cloud Environment Using OTP”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 1, no. 4, pp. 38–43, Aug. 2013.

Issue

Section

Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.