SlideShare a Scribd company logo
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
FINE-GRAINED TWO-FACTOR ACCESS CONTROL FOR WEB-BASED CLOUD
COMPUTING SERVICES
ABSTRACT
In this paper, we introduce a new fine-grained two-factor authentication (2FA) access
control system for web-based cloud computing services. Specifically, in our proposed 2FA
access control system, an attribute-based access control mechanism is implemented with the
necessity of both a user secret key and a lightweight security device. As a user cannot access the
system if they do not hold both, the mechanism can enhance the security of the system,
especially in those scenarios where many users share the same computer for web-based cloud
services. In addition, attribute-based control in the system also enables the cloud server to restrict
the access to those users with the same set of attributes while preserving user privacy, i.e., the
cloud server only knows that the user fulfills the required predicate, but has no idea on the exact
identity of the user. Finally, we also carry out a simulation to demonstrate the practicability of
our proposed 2FA system.
EXISTING SYSTEM
Though the new paradigm of cloud computing provides great advantages, there are
meanwhile also concerns about security and privacy especially for web-based cloud services. As
sensitive data may be stored in the cloud for sharing purpose or convenient access; and eligible
users may also access the cloud system for various applications and services, user authentication
has become a critical component for any cloud system. A user is required to login before using
the cloud services or accessing the sensitive data stored in the cloud. There are two problems for
the traditional account/password based system.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
DISADVANTAGES OF EXISTING SYSTEM:
1. First, the traditional account/password-based authentication is not privacy-preserving.
However, it is well acknowledged that privacy is an essential feature that must be
considered in cloud computing systems.
2. Second, it is common to share a computer among different people. It may be easy for
hackers to install some spyware to learn the login password from the web-browser.
3. In existing, Even though the computer may be locked by a password, it can still be
possibly guessed or stolen by undetected malwares.
PROPOSED SYSTEM
In this paper, we propose a fine-grained two-factor access control protocol for web-based
cloud computing services, using a lightweight security device. The device has the following
properties: (1) it can compute some lightweight algorithms, e.g. hashing and exponentiation; and
(2) it is tamper resistant, i.e., it is assumed that no one can break into it to get the secret
information stored inside.
ADVANTAGES OF PROPOSED SYSTEM:
1. Our protocol provides a 2FA security
2. Our protocol supports fine-grained attribute-based access which provides a great
flexibility for the system to set different access policies according to different scenarios.
At the same time, the privacy of the user is also preserved.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
SYSTEM ARCHITECTURE
MODULES
1. Trustee Module
2. Attribute-Issuing Authority Module
3. User Module
4. Cloud Service Provider Module
MODULE DESCRIPTION:
Trustee:
It is responsible for generating all system parameters and initializes the security device.
Attribute-issuing Authority:
It is responsible to generate user secret key for each user according to their attributes.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
User:
It is the player that makes authentication with the cloud server. Each user has a secret key
issued by the attribute-issuing authority and a security device initialized by the trustee.
Cloud Service Provider:
It provides services to anonymous authorized users. It interacts with the user during the
authentication process.
SYSTEM CONFIGURATION
HARDWARE CONFIGURATION
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION
 Operating System - Windows XP
 Programming Language - JAVA

More Related Content

PDF
Secure Code Generation for Multi-level Mutual Authentication
PPTX
encryption ppt
PPTX
secure and authentication using personal device ppt
PDF
Keystroke with Data Leakage Detection for Secure Email Authentication
PDF
Ds netsuite-two-factor-authentication
PPSX
E commerce security
PDF
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
PPTX
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Secure Code Generation for Multi-level Mutual Authentication
encryption ppt
secure and authentication using personal device ppt
Keystroke with Data Leakage Detection for Secure Email Authentication
Ds netsuite-two-factor-authentication
E commerce security
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020

Similar to Fine grained two-factor access control for web-based cloud computing services (20)

PDF
Two Aspect Validation Control Frameworks for Online Distributed Services
DOC
Shared authority based privacy preserving authentication protocol in cloud co...
DOC
Shared authority based privacy preserving authentication protocol in cloud co...
PPTX
cloud.pptx
PDF
Decentralized access control with anonymous authentication of data stored in ...
PPTX
Fine grained two-factor access control for cloud
PDF
Tmacs a robust and verifiable threshold multi authority access control system...
PDF
Tmacs a robust and verifiable threshold multi authority access control system...
PDF
Hierarchal attribute based cryptographic model to handle security services in...
DOCX
Control cloud data access privilege and anonymity with fully
PPTX
Authentication and Privacy in Cloud
PPTX
Achieving Secure And Scalable Cloud computing
PDF
Shared authority based privacy preserving authentication protocol in cloud co...
PDF
Achieving Secure, sclable and finegrained Cloud computing report
PPT
Shared authority based privacy preserving authentication protocol in cloud co...
PDF
Cloud Computing Environment using Secured Access Control Technique
PPT
Decentralized access control with anonymous authentication of data stored in ...
DOCX
A scalable attribute based access control scheme with flexible delegation cum...
PPTX
Decentralized access control with anonymous authentication of data stored in ...
PDF
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
Two Aspect Validation Control Frameworks for Online Distributed Services
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
cloud.pptx
Decentralized access control with anonymous authentication of data stored in ...
Fine grained two-factor access control for cloud
Tmacs a robust and verifiable threshold multi authority access control system...
Tmacs a robust and verifiable threshold multi authority access control system...
Hierarchal attribute based cryptographic model to handle security services in...
Control cloud data access privilege and anonymity with fully
Authentication and Privacy in Cloud
Achieving Secure And Scalable Cloud computing
Shared authority based privacy preserving authentication protocol in cloud co...
Achieving Secure, sclable and finegrained Cloud computing report
Shared authority based privacy preserving authentication protocol in cloud co...
Cloud Computing Environment using Secured Access Control Technique
Decentralized access control with anonymous authentication of data stored in ...
A scalable attribute based access control scheme with flexible delegation cum...
Decentralized access control with anonymous authentication of data stored in ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
Ad

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ad

Recently uploaded (20)

PDF
Computing-Curriculum for Schools in Ghana
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Lesson notes of climatology university.
PPTX
Cell Types and Its function , kingdom of life
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Classroom Observation Tools for Teachers
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Cell Structure & Organelles in detailed.
PDF
Sports Quiz easy sports quiz sports quiz
Computing-Curriculum for Schools in Ghana
FourierSeries-QuestionsWithAnswers(Part-A).pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
human mycosis Human fungal infections are called human mycosis..pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Anesthesia in Laparoscopic Surgery in India
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
VCE English Exam - Section C Student Revision Booklet
Lesson notes of climatology university.
Cell Types and Its function , kingdom of life
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Classroom Observation Tools for Teachers
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Insiders guide to clinical Medicine.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Final Presentation General Medicine 03-08-2024.pptx
Cell Structure & Organelles in detailed.
Sports Quiz easy sports quiz sports quiz

Fine grained two-factor access control for web-based cloud computing services

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com FINE-GRAINED TWO-FACTOR ACCESS CONTROL FOR WEB-BASED CLOUD COMPUTING SERVICES ABSTRACT In this paper, we introduce a new fine-grained two-factor authentication (2FA) access control system for web-based cloud computing services. Specifically, in our proposed 2FA access control system, an attribute-based access control mechanism is implemented with the necessity of both a user secret key and a lightweight security device. As a user cannot access the system if they do not hold both, the mechanism can enhance the security of the system, especially in those scenarios where many users share the same computer for web-based cloud services. In addition, attribute-based control in the system also enables the cloud server to restrict the access to those users with the same set of attributes while preserving user privacy, i.e., the cloud server only knows that the user fulfills the required predicate, but has no idea on the exact identity of the user. Finally, we also carry out a simulation to demonstrate the practicability of our proposed 2FA system. EXISTING SYSTEM Though the new paradigm of cloud computing provides great advantages, there are meanwhile also concerns about security and privacy especially for web-based cloud services. As sensitive data may be stored in the cloud for sharing purpose or convenient access; and eligible users may also access the cloud system for various applications and services, user authentication has become a critical component for any cloud system. A user is required to login before using the cloud services or accessing the sensitive data stored in the cloud. There are two problems for the traditional account/password based system.
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com DISADVANTAGES OF EXISTING SYSTEM: 1. First, the traditional account/password-based authentication is not privacy-preserving. However, it is well acknowledged that privacy is an essential feature that must be considered in cloud computing systems. 2. Second, it is common to share a computer among different people. It may be easy for hackers to install some spyware to learn the login password from the web-browser. 3. In existing, Even though the computer may be locked by a password, it can still be possibly guessed or stolen by undetected malwares. PROPOSED SYSTEM In this paper, we propose a fine-grained two-factor access control protocol for web-based cloud computing services, using a lightweight security device. The device has the following properties: (1) it can compute some lightweight algorithms, e.g. hashing and exponentiation; and (2) it is tamper resistant, i.e., it is assumed that no one can break into it to get the secret information stored inside. ADVANTAGES OF PROPOSED SYSTEM: 1. Our protocol provides a 2FA security 2. Our protocol supports fine-grained attribute-based access which provides a great flexibility for the system to set different access policies according to different scenarios. At the same time, the privacy of the user is also preserved.
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com SYSTEM ARCHITECTURE MODULES 1. Trustee Module 2. Attribute-Issuing Authority Module 3. User Module 4. Cloud Service Provider Module MODULE DESCRIPTION: Trustee: It is responsible for generating all system parameters and initializes the security device. Attribute-issuing Authority: It is responsible to generate user secret key for each user according to their attributes.
  • 4. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com User: It is the player that makes authentication with the cloud server. Each user has a secret key issued by the attribute-issuing authority and a security device initialized by the trustee. Cloud Service Provider: It provides services to anonymous authorized users. It interacts with the user during the authentication process. SYSTEM CONFIGURATION HARDWARE CONFIGURATION  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION  Operating System - Windows XP  Programming Language - JAVA