Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
PRESENTED BY K.PRATHAP KUMAR 8051020051 B SECTION GUIDED BY MR. AUGUSTINE ISAAC ., ME ., AP(SR.GRADE) SRM UNIVERSITY
ABSTRACT
Cloud computing is an emerging, on-demand and
internet - based technology. It provides variety of services over internet such as, software, hardware, data storage and infrastructure. This technology has been used by worldwide customers to improve their business performance. However, to utilize these services by authorized customer, it is necessary to have strict authentication check.
ABSTRACT conti.
At present, authentication is done in several ways:
such as, textual, graphical, bio-metric, 3D password and third party authentication. This paper presents the strict authentication system by introducing the multi-level authentication technique which generates/authenticates the password in multiple levels to access the cloud services.
Existing System:
In an Existing system have authentication
technique. It provides Verity of Services over internet , such as Simple text password 3rd party authentication Graphical password Biometric 3D password
Drawbacks:
Minimum level authentication Not Applicable for remote and Internet users. Easy to hack
Proposed System:
It generates the password and concatenates the
generated password at multilevel. Based on the leaf level concatenated password, one can access the cloud services provided that the password authentication is successful in all the previous levels. Authenticated clients organizations that access the cloud services.
Advantages:
Highly Secured
Breaking the authentication is 0.001
System Architecture
Modules
Admin Module Key Generation Module Organization Module Team Leader Module Team Member Module
Admin Module
The purpose of admin is to maintain the details
about the Organization, Team Leaders and Employees. Information stored in the cloud is authenticated by admin using multi level authentication process.
Authentication by multi level. Key is providing by admin. This key is having the text password and individual information. This information is vary depends on cloud user based on multi level authentication.
Organization Module
In this module Organization send request to admin
to get key for access data from the cloud. The key given by admin is based on organization details. By using this process the Organization can access files with valid authentication.
password to access information from the cloud. Team Leaders are the next level of organization. After providing key to organization the admin give permission to team leader by providing separate key to them. The key having details about the team leaders.
username and password to access information the cloud. Team members are the second level of organization. After providing key to team leader the admin give permission to team member by providing separate key to them. The key having details about the employees in the organization.
Screen shots
login
Key generation
Future work
This is the future work of our research. Our future
work will be carried out in adding multi-dimensional password generation method to multi-level authentication technique.
References
[1]. IEEE - The Application of Cloud Computing in Education Informatization, Modern Educational Tech... center Bo Wang, HongYu Xing. [2]. NIST Definition http://www.au.af.mil/au/awc/awcgate/nist/cloud-def-v15.doc [3].CA Technologies cloud authentication system http://www.ca.com/us/authenticationsystem.aspx [4]. X. Suo, Y. Zhu, G. S. Owen, Graphical passwords: A survey, in Proc. 21st Annual Computer Security Application. Conf. Dec. 59, 2005, pp. 463472. [5] S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, Authentication using graphical passwords: Basic results, in Proc. Human-Comput. Interaction Int., Las Vegas, NV, Jul. 2527, 2005. [6] Fawaz A. Alsulaiman and Abdulmotaleb El Saddik,Three-Dimensional Password for More Secure Authentication, IEEE, http://ieeexplore.ieee.org., Last Updated 6 Feb 2008 [7] Cloud Computing services & comparisons http://www.thbs.com/pdfs/Comparison%20of%20Cloud%20computing%20services.pdf [8] A User Identity Management Protocol for Cloud Computing Paradigm Safiriyu Eludiora1, Olatunde Abiona2, Ayodeji Oluwatope1, Adeniran Oluwaranti1, Clement Onime3,Lawrence Kehinde apered in Int. J. Communications, Network and System Sciences, 2011, 4, 152-163
THANKING YOU