Performance Analysis of Aes and 3des for Implementing Multi Level Authentication in Cloud Through Rest Api

  • Authors

    • M. J. Balachandran
    • P. Sujatha
    2018-12-09
    https://doi.org/10.14419/ijet.v7i4.36.24241
  • Multi factor authentication, application programming interface, insecure API, & Cloud computing security challenges.
  • Abstract

    Last couple of decades, internet usage has been changed each and every technology domain. This has lead to implementation and accommodation of cloud computing. As the Cloud has the nature of sharing the data, it led to various types of security attacks. Hence security mechanisms which has various features/types are needed and hence security breaches can be prevented. Authentication is one of the vital techniques playing a major role in security part. Cloud Computing verifies the identification of a user during the process of accessing the services from cloud servers. Different authentication techniques are used to verify the user’s identity before granting the access to them.  This paper  analyze the performance of AES and  3DES algorithms and find out the best suit for implementing multi level authentication in cloud. Based on execution time, request and response time against the concurrent user load and file size, AES is faster, more secure and safer than 3DES.   

     

     

  • References

    1. [1] Luo Y, Hongbo Z, Qingni S, Anbang R & Zhonghai W, “Restpl: Towards a request-oriented policy language for arbitrary restful apisâ€, IEEE International Conference on Web Services (ICWS), (2016), pp.666-671.

      [2] Dindoliwala VJ & Rustom DM, “Survey on Security Mechanisms In NoSQL Databasesâ€, International Journal of Advanced Research in Computer Science, Vol.8, No.5, (2017).

      [3] Gawade S, Anand B, Ashish R & Shweta M, “Biometric Authentication using Software as a Service in Cloud Computingâ€, International Journal Of Engineering And Computer Science, Vol.6, No.3, (2017).

      [4] Anuradha A &Hardik BP, “Biometric Based Security Model for Cloud Computing Using Image Steganographyâ€, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.7, No.1, (2017).

      [5] Balachandran MJ, “Efficient Multi-Level Authentication for Cloud API based on RestPLâ€, International Journal of Computer Science and Information Securityâ€, Vol.15, No.11, (2017).

      [6] Syed LQA & Areeba K, “Cloud and Biometrics: The Future of Authenticationâ€, International Journal of Advanced Research in Computer Science, Vol.8, No.2, (2017).

      [7] Ankita C & Neeraj S, “Multi-Level Authentication Technique for Accessing Cloud Servicesâ€, International Journal of Innovative Research in Computer and Communication Engineering, Vol.4, No.12, (2016).

      [8] Soyjaudah KMS, Gianeswar R & Muhammad YK, “Cloud computing authentication using cancellable biometricsâ€, IEEE AFRICON, (2013), pp.1-4.

      [9] Eldefrawy MH, Khaled A & Muhammad KK, “OTP-based two-factor authentication using mobile phonesâ€, IEEE Eighth International Conference on Information Technology: New Generations (ITNG), (2011), pp.327-331.

      [10] Acharya S, Apoorva P & Pawar PY, “Two factor authentication using smartphone generated one time passwordâ€, IOSR Journal of Computer Engineering (IOSR-JCE), Vol.11, No.2, (2013), pp.85-90.

      [11] Lee S, Ong I, Lim HT & Lee HJ, “Two factor authentication for cloud computingâ€, International Journal of KIMICS, Vol.8, (2013), pp.427-433.

      [12] Giradkar MS, Shraddha S & Choudhari NK, “A survey paper on Various biometric security system methodsâ€, International Research Journal of Engineering and Technology, (2016).

      [13] Farooq H, “A Review on Cloud Computing Security Using Authentication Techniquesâ€, International Journal of Advanced Research in Computer Science, Vol.8, No.2, (2017).

  • Downloads

  • How to Cite

    J. Balachandran, M., & Sujatha, P. (2018). Performance Analysis of Aes and 3des for Implementing Multi Level Authentication in Cloud Through Rest Api. International Journal of Engineering & Technology, 7(4.36), 773-776. https://doi.org/10.14419/ijet.v7i4.36.24241

    Received date: 2018-12-18

    Accepted date: 2018-12-18

    Published date: 2018-12-09