Authentication for Cloud Services using Steganography

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    The issue of anchoring access to the data stored in remote is intense obtain data to financial balances, wellbeing files, protected innovation and data are made by just a couple of snaps, paying little mind to geographic area. In the meantime, more of these get to are produced using handsets. Distributed computing is prominently appropriate for tending to issues identified with constrained customer assets, as calculation from customers and offers dynamic accessibility of process assets. Validation of the organizations clients to the cloud benefit is required in light of the fact that thusly it is disposed of the assaults dangers to data in Cloud administrations. General verification need for associations required to get to the authentication of Cloud. This can expanding data protection  in Cloud Computing and it is in truth a solid half and half client verification arrangement in light of utilizing picture joined with content keeping in mind the end goal to stay away from the shortcoming of straightforward client and secret key answer for validation. A two factor watchword picture based validation strategy used for cloud authentication. This verification approach is utilized without extra equipment included and exhibits the benefits of use as far as security and ease of use. Each time when the client will be requested to give his/her character, a shape for each picture incorporated into the photograph will be recorded. The client should recollect the mystery data of every picture precisely present in the structures. Worldwide Cloud data get to arrangement is founded on our cross breed proposed content picture based arrangement, and will be finished in the X.509 endorsements



  • Keywords

    verification, multi factor secret key validation, solid confirmation, image based, IaaS, PaaS, SaaS.

  • References

      [1] Tianfield H., Cloud Computing Architectures, Proc. of 2011 IEEE Int. Conf. on Systems, Man and Cybernetics (SMC11), Anchorage, Alaska, USA, 2011.

      [2] CSA, 2010. Domain 12: Guidance for Identity & Access Management V2.1., Cloud Security Alliance. Available at: http:// www. v2.10.pdf, 2010.

      [3] Metri P. and Sarote G., Privacy Issues and Challenges in Cloud computing, InternationalJournal of Advanced Engineering Sciences and Technologies, 5(1): 5-6, 2011.

      [4] PARC,R.C., et al.,Authentication in the Clouds: A Framework and its Application to Mobile

      [5] Users, ACM Cloud Computing Security Workshop (CCSW); 2010 October 8; Chicago, IL, 2011.

      [6] Lonea A.M., Tianfield H., Popescu D.E., Identity management for cloud computing, In NewConcepts and Applications in Soft Computing, Studies in Computational Intelligence Series,

      [7] Volume 417, May 2012.

      [8] SETECS Inc, Security Architecture, for Cloud Computing Environments, White Paper, February 1, Available at: http://security. setecs. com/ Documents/5 SETECS Cloud Security Architecture.pdf, 2011.

      [9] Kay, R., Biometric authentication, Available at:

      [10] Tari, F., Ant Ozok, A., Holdon, H.S, A Comparison of Percieved and Real Shoulder-surfingRisks Between Alphanumeric and Graphical Passwords, retrieved June 10 2006 Available at: http://cups. cs.cmu. edu/ soups/2006 /proceedings/p56 tari.pdf, 2006.

      [11] Dhamija R., et al, DĂŠjĂ Vu: a user study using images for authentication, Proc. of the 9th conference on USENIX Security Symposium - Vol. 9, USENIX Association Berkeley, CA, USA 2000, Available at: adrian/ projects/ usenix2000/usenix. pdf, 2000.

      [12] Jackson L., Analysis of Image-Based Authentication and its Role in Security Systems of the

      [13] Future, Available at: bill/lee2006.pdf, 2006.

      [14] Nitin, Vivek Kumar Sehgal, et al., Image Based Authentication System with Sign-In Seal, Proc. of the World Congress on Engineering and Computer Science, WCECS 2008, San Francisco, USA, 2008.

      [15] Renaud K., Just M., Pictures or Questions? Examining User Responses to Association- Based Authentication, ACM Proceedings of the British HCI Conference 2010, Dundee, Scotland,6-10 September 2010.

      [16] Confident Technologies Inc., Confident ImageShieldTM, Available at: http:// www. confident, 2011.

      [17] Newman R.E. HarshP., and Jayaraman P, Security Analysis of and Proposal for Image Based Authentication, IEEE Carnahan, 2005.

      [18] Just M. and Aspinall D., Personal choice and challenge questions: A security and usability assessment. In L. Cranor, editor, SOUPS, ACM International Conference Proceeding Series. ACM, 2009.




Article ID: 21644
DOI: 10.14419/ijet.v7i4.29.21644

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.