Open Access Open Access  Restricted Access Subscription or Fee Access

An Efficient Framework for Enhancing User Authentication in Cloud Storage Using Digital Watermark


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v10i2.5236

Abstract


Security issues in cloud computing is one of the major reasons in slowing down its adoption by businesses and among these issues: weak user authentication. In fact, the use of text password is still relatively widespread, especially, for authentication in a cloud environment. Therefore, numerous approaches have been proposed to overcome this problem such as graphical passwords, biometric scans and 3D password objects. In this paper, we propose a cloud-based two-factor authentication framework called Two Levels Authentication Cloud (2LAC). The framework uses an image and a secret watermark as factors of authentication. Experimental results illustrate that 2LAC offers an efficient mechanism for enhancing user authentication in the cloud environment and can eliminate common types of attacks.
Copyright © 2015 Praise Worthy Prize - All rights reserved.

Keywords


Cloud Computing; Security; Watermark; Multi-Factor Authentication; Steganography

Full Text:

PDF


References


Govinda K. , Sathiyamoorthy E.: Agent Based Security for Cloud Computing using Obfuscation, Procedia Engineering, Volume 38, pp. 125-129, (2012).
http://dx.doi.org/10.1016/j.proeng.2012.06.018

Zhidong Shen , Li Li , Fei Yan , Xiaoping Wu: Cloud Computing System Based on Trusted Computing Platform , (ICICTA), International Conference on Intelligent Computation Technology and Automation, pp.942-945. IEEE(2010).
http://dx.doi.org/10.1109/icicta.2010.724

National Institute of Standards and Technology : The NIST Definition of Cloud Computing http://csrc.nist.gov/publications/nistpubs/800-145/SP800145.pdf, September (2011)

Patidar, S., Rane, D., Jain, P.: A survey paper on cloud computing. In: 2nd International Conference on Advanced Computing Communication Technologies, pp. 394–398. IEEE (2012).
http://dx.doi.org/10.1109/acct.2012.15

Kulkarni, G. ; Gambhir, J. ; Patil, T. ; Dongare, A.: A SecurityAspects in Cloud Computing, 3rd International Conference on Software Engineering and Service Science(ICSESS),vol. 1, pp.547-550.IEEE(2012).
http://dx.doi.org/10.1109/ICSESS.2012.6269525

Subashini, S., Kavitha, V.: A survey on security issues in service Delivery models of cloud computing. J. Netw.Comput.Appli. 34(1),1–11 (2011).
http://dx.doi.org/10.1016/j.jnca.2010.07.006

Patidar, S., Rane, D., Jain, P.: A survey paper on cloud computing, 2nd International Conference on Advanced Computing Communication Technologies, pp. 394–398. IEEE(2012).
http://dx.doi.org/10.1109/acct.2012.15

Geong Sen Poh, Mohd Amril Nurman Mohd Nazir, Bok-Min: An Authentication Framework for Peer-to-Peer Cloud ,SIN '13 Proceedings of the 6th International Conference on Security of Information and Networks , ACM New York 2013, pp.94 -101,
http://dx.doi.org/10.1145/2523514.2523531

Lenk, A., Klems, M., Nimis, J., Tai, S., Sandholm, T: What’s inside the cloud? An architectural map of the cloud landscape. In: Proceedings of the ICSE Workshop on Software Engineering Challenges of Cloud Computing, pp. 23–31. IEEE Computer Society, Washington, DC, USA (2009).
http://dx.doi.org/10.1109/cloud.2009.5071529

Natis Y. V., Lheureux B. J. , Pezzini M., Cearley D. W., Knipp E., Plummer D. C.: PaaS Road Map: A Continent Emerging, Gartner, Tech. Rep., January 2011, http://www.gartner.com/id=1521622.

Yassin, A.A. ; Hai Jin ; Ibrahim, A. ; Deqing Zou : Anonymous Password Authentication Scheme by Using Digital Signature and fingerprint in Cloud Computing, Second International Conference on cloud and Green Computing, pp. 282-289, IEEE(2012)
http://dx.doi.org/10.1109/cgc.2012.91

Choudhury, A.J., Kumar P., Sain M., Hyotaek Lim , Hoon Jae-Lee: A Strong User Authentication Framework for Cloud Computing, Services Computing Conference (APSCC), 2011 IEEE Asia-Pacific, pp.110-115.
http://dx.doi.org/10.1109/apscc.2011.14

Gunawardena, S. , Kulkarni, D. , Gnanasekaraiyer, B.: Steganography based Framework to Prevent active attacks during user authentication , The 8th International Conference on Computer Science and Education (ICCSE 2013) April 26-28, IEEE (2013),
http://dx.doi.org/10.1109/iccse.2013.6553942

Gonzalez, N., Miers, C., Redigolo, F., Carvalho, T., Simplicio, M.,Naslund, M., Pourzan di,M.:A quantitative analysis of current Security concerns and solutions for cloud computing, IEEE 3rd International Conference on Cloud Computing Technology and Science, pp.231-238,IEEE(2011).
http://dx.doi.org/10.1109/cloudcom.2011.39

Banyal R.K., Jain P. ; Jain V.K.n. : Multi-factor Authentication Framework for Cloud Computing , 2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation (CIMSim),IEEE 2013, pp.105-110,(2013).
http://dx.doi.org/10.1109/cimsim.2013.25

Diogo A. B., Fernandes Liliana F. B., Soares João V., Gomes Mário M., Freire Pedro R., InácioSecurity M. : Issues in cloud environments: a survey, International Journal of Information Security,Vol.13, Springer, pp.113-170,(2014)
http://dx.doi.org/10.1007/s10207-013-0208-7

Nirmalrani, V., Sakthivel, P., Protection of resources using role based access control with multilevel authentication, (2014) International Review on Computers and Software (IRECOS), 9 (11), pp. 1867-1874.
http://dx.doi.org/10.15866/irecos.v9i11.4050

Lamport L., Password Authentication with Insecure Communication, Communications of the ACM, Vol. 24(11),pp. 770-772(1981).
http://dx.doi.org/10.1145/358790.358797

Mannan M., van Oorschot P.:Digital objects as passwords. 3rd USENIX Workshop on Hot Topics in Security (HotSec '08), San Jose, CA, US

Almulla, S.A. , Chan Yeob Yeun: Cloud Computing security Management,Second International Conference on Engineering Systems Management and Its Applications (ICESMA), pp.1-7.IEEE(2010)

Jivanadham, L.B. , Islam, A.K.M.M. , Katayama, Y. , Komaki, S., Baharun, S., Cloud Cognitive Authenticator (CCA) A Public Cloud Computing Authentication Mechanism, 2013 International Conference On Informatics, Electronics and Vision (ICIEV), pp.1-6.IEEE(2013).
http://dx.doi.org/10.1109/iciev.2013.6572626

M. Sumathi, Implementation of Multifactor Authentication System accessing cloud service, International Journal of Scientific And Research Publications, Volume 3, Issue 6, June 2013

Bamatraf A., Rosziati Ibrahim, Mohd Salleh, Mohd Najib: A new Digital watermarking algorithm using combination of least significant bit and Inverse Bit, Journal of Computing, Vol 3, Issue 4, April,2011,pp.1-8
http://dx.doi.org/10.1109/iccaie.2010.5735066

Lou D.C., Hu C.H.:LSB steganographic method based on Reversible histogram transformation function for resisting statistical Steganalysis, Elsevier Science Inc. New York, NY, USA, Vol. 188, pp.346-358.
http://dx.doi.org/10.1016/j.ins.2011.06.003

Jivanadham L.B. , Construction and Maintenance of a Secured Dynamic Cluster- Based Wireless Sensor”, MJIIT-JUCJoint Symposium (MJJS 2012), November 2012, Kuala Lumpur, Malaysia.

Gurav, S.M. , Gawade, L.S. , Rane, P.K., Khochare, N.R., Graphical Password Authentication Cloud securing scheme, IEEE International Conference on Electronic Systems, Signal Processing and Computing Technologies(ICESC),IEEE 2014,pp. 479-483,(2014).
http://dx.doi.org/10.1109/icesc.2014.90

Cheng Guo, Chin-Chen Chang, Chaotic maps-based password authenticated key agreement using smart cards , Commun Nonlinear Sci Numer Simulat,ELSEVIER,Vol. 18, Issue 6 ,2013,pp.1433-1440,(2013).
http://dx.doi.org/10.1016/j.cnsns.2012.09.032

Soyjaudah, K.M.S. , Ramsawock, G. , Khodabacchus, M.Y.:Cloud Computing Authentication using Cancellable Biometrics, AFRICON 2013, IEEE 2013, pp.1-4.(2013).
http://dx.doi.org/10.1109/afrcon.2013.6757821

Ram Mohan, N.R., Baburaj, E., Genetic clustering with workload multi-task scheduler in cloud environment, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (3), pp. 77-86.

Sabri, A., Karoud, M., Tairi, H., Aarab, A., A robust image watermarking based on the empirical mode decomposition, (2009) International Review on Computers and Software (IRECOS), 4 (3), pp. 360-365.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize