An Enhanced Study on Users Privacy with Anonymous Password Based Authentication towards Cloud Storage

Authors

  • M. V. Bhanu Prakash  Assistant Professor, Department of Information Technology, CBIT, Hyderabad, Telangana, India

Keywords:

Privacy, Anonymity, Key Exchange, Password-Based Authentication.

Abstract

Cloud computing offers its flexibility and dynamic nature as far as its entrance to assets whenever and anyplace. All information and different assets in cloud stockpiling are overseen and controlled by the Cloud Service Provider. They give security and guarantee that the information is shielded and free from any powerlessness. Be that as it may, giving privacy through authentication component is a major test. The greater part of the present authentication plans depend on trusted third party to distinguish and confirm user's qualification which can prompt straightforwardness issue. Keeping in mind the end goal to guarantee for a secured exchange, they need to protect user's privacy from being uncovered. The uncover data of user's qualification will make it less demanding for aggressor to pick up the data for getting to ordered information. They can block and control user's identity to access touchy information of user in the cloud stockpiling. This issue can be comprehended by presenting anonymity includes in the authentication conspire by concealing the user's data and to shield the user's identity from getting manhandled. Anonymity will secure user's identity by concealing the genuine users' identity amid the authentication procedure particularly when users host to manage third gathering in their correspondence. The risk does originate from outside aggressor as well as originates from interior party who has full specialist access to the server. This paper proposed an unknown authentication conspire which is a blend of password-based authentication and anonymity include so as to safeguard user's privacy without including the trusted third party amid the authentication procedure. Subsequently, it can ensure a secured exchange with anonymity highlights to secure user's privacy. This paper additionally displays the depiction of information privacy and security which can impact user's trust in utilizing cloud services. Security investigation depictions of conceivable attacks to the proposed conspire are additionally introduced in this paper. The Secure Remote Password (SRP) convention is utilized for this venture with some improvement to calculation. Later on, the proposed plan will be tried with a portion of the conceivable assault dangers to demonstrate that it is secured against the assault. The noteworthy of this exploration is to protect user's privacy with unknown password-based authentication in the cloud condition with no necessity to trusted third party which can oppose from powerlessness to attacks.

References

  1. Bowen J. A. 2011. Cloud computing: Issues in information privacy/security and business contemplations. The Computer and Internet Lawyer, Vol. 28, No. 8, pp. 1-8.
  2. Huang J. and Nicol, D. M. 2013. Confide in instruments for cloud computing. Diary of Cloud Computing, Vol. 2, No. 1, pp. 1-14.
  3. Ko R. K. L., Jagadpramana P., Mowbray M., Pearson, S., Kirchberg M., Liang Q. and Lee B. S. 2011. TrustCloud: A Framework for Accountability and Trust in Cloud Computing. 2011 IEEE World Congress on Services. pp. 584– 588.
  4. Yassin A. A., Jin H., Ibrahim A., Qiang W. and Zou D. 2013. Cloud authentication based on mysterious one-time password. In Ubiquitous Information Technologies and Applications. pp. 423-431.
  5. Khattak Z. A., Manan J. A. and Sulaiman S. 2011. Examination of Open Environment Sign-in Schemes-Privacy Enhanced and Trustworthy Approach. Diary of Advances in Information Technology. Vol. 2, No. 2, pp. 109– 121.
  6. Jaidhar C. D. 2013. Improved shared authentication plot for cloud engineering. In Advance Computing Conference (IACC), 2013 IEEE third International. pp. 70-75.
  7. Hasan R. and Khan R. 2014. Interaction provenance show for brought together authentication factors in service arranged computing. In Proceedings of the fourth ACM gathering on Data and application security and privacy. pp. 127-130.
  8. Mun J., Jin Q., Jeon W. and Won D. 2013. An Improvement of Secure Remote User Authentication Scheme Using Smart Cards. In International Conference on IT Convergence and Security (ICITCS). pp. 1-4.
  9. Lamport L. 1981. Password authentication with insecure correspondence. Interchanges of the ACM. Vol. 24, No. 11, pp. 770-772.
  10. Rescorla E. 1999. Diffie-Hellman key understanding technique.
  11. Bellovin S. M. and Merritt M. 1992. Encoded key exchange: Password-based conventions secure against dictionary attacks. In Research in Security and Privacy. pp. 72-84.
  12. Khalid U., Ghafoor An., Irum M. and Shibli M. A. 2013. Cloud based secure and privacy upgraded authentication and approval convention. Procedia Computer Science. Vol. 22, pp. 680-688.
  13. Slamanig D. 2011. Unknown authentication from open key encryption returned to. In Communications and Multimedia Security. pp. 247-249.
  14. Mishra R. 2014. Unknown Remote User Authentication and Key Agreement for Cloud Computing. Vol. 258, pp. 899– 913.
  15. Das M. L., Saxena A. and Gulati V. P. 2004. A dynamic ID-based remote user authentication conspire. IEEE Transactions on Consumer Electronics. Vol. 50, No. 2, pp. 629-631
  16. Kshetri N. 2013. Privacy and security issues in cloud computing: The part of institutions and institutional development. Broadcast communications Policy. Vol. 37, No. 4, pp. 372-386.
  17. Cisco CloudWatch Report 2012. Summer 2012. Retrieved from Website: http://www.cisco.com/cisco/web/UK/resources/cisco_clo udwatch_2012_2606.pdf
  18. Thomas Wu. 1998. The Secure Remote Password Protocol. Proceedings of the Symposium on Network and Distributed Systems Security NDSS 98. Pp. 97– 111. Recovered from ftp://srp.stanford.edu/bar/srp/srp.ps.
  19. Sajjad A., Rajarajan M., Zisman A. and Dimitrakos, T. 2015. An adaptable and dynamic application-level secure correspondence system for inter-cloud services. Future Generation Computer Systems. Vol. 48, pp. 19– 27.
  20. Thomas Wu. 2002. Srp-6: Improvements and refinements to the secure remote password convention

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
M. V. Bhanu Prakash, " An Enhanced Study on Users Privacy with Anonymous Password Based Authentication towards Cloud Storage, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 5, pp.1748-1759, March-April-2018.