Performance Analysis of Aes and 3des for Implementing Multi Level Authentication in Cloud Through Rest Api

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Last couple of decades, internet usage has been changed each and every technology domain. This has lead to implementation and accommodation of cloud computing. As the Cloud has the nature of sharing the data, it led to various types of security attacks. Hence security mechanisms which has various features/types are needed and hence security breaches can be prevented. Authentication is one of the vital techniques playing a major role in security part. Cloud Computing verifies the identification of a user during the process of accessing the services from cloud servers. Different authentication techniques are used to verify the user’s identity before granting the access to them.  This paper  analyze the performance of AES and  3DES algorithms and find out the best suit for implementing multi level authentication in cloud. Based on execution time, request and response time against the concurrent user load and file size, AES is faster, more secure and safer than 3DES.   

     

     


  • Keywords


    Multi factor authentication, application programming interface, insecure API, & Cloud computing security challenges.

  • References


      [1] Luo Y, Hongbo Z, Qingni S, Anbang R & Zhonghai W, “Restpl: Towards a request-oriented policy language for arbitrary restful apis”, IEEE International Conference on Web Services (ICWS), (2016), pp.666-671.

      [2] Dindoliwala VJ & Rustom DM, “Survey on Security Mechanisms In NoSQL Databases”, International Journal of Advanced Research in Computer Science, Vol.8, No.5, (2017).

      [3] Gawade S, Anand B, Ashish R & Shweta M, “Biometric Authentication using Software as a Service in Cloud Computing”, International Journal Of Engineering And Computer Science, Vol.6, No.3, (2017).

      [4] Anuradha A &Hardik BP, “Biometric Based Security Model for Cloud Computing Using Image Steganography”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.7, No.1, (2017).

      [5] Balachandran MJ, “Efficient Multi-Level Authentication for Cloud API based on RestPL”, International Journal of Computer Science and Information Security”, Vol.15, No.11, (2017).

      [6] Syed LQA & Areeba K, “Cloud and Biometrics: The Future of Authentication”, International Journal of Advanced Research in Computer Science, Vol.8, No.2, (2017).

      [7] Ankita C & Neeraj S, “Multi-Level Authentication Technique for Accessing Cloud Services”, International Journal of Innovative Research in Computer and Communication Engineering, Vol.4, No.12, (2016).

      [8] Soyjaudah KMS, Gianeswar R & Muhammad YK, “Cloud computing authentication using cancellable biometrics”, IEEE AFRICON, (2013), pp.1-4.

      [9] Eldefrawy MH, Khaled A & Muhammad KK, “OTP-based two-factor authentication using mobile phones”, IEEE Eighth International Conference on Information Technology: New Generations (ITNG), (2011), pp.327-331.

      [10] Acharya S, Apoorva P & Pawar PY, “Two factor authentication using smartphone generated one time password”, IOSR Journal of Computer Engineering (IOSR-JCE), Vol.11, No.2, (2013), pp.85-90.

      [11] Lee S, Ong I, Lim HT & Lee HJ, “Two factor authentication for cloud computing”, International Journal of KIMICS, Vol.8, (2013), pp.427-433.

      [12] Giradkar MS, Shraddha S & Choudhari NK, “A survey paper on Various biometric security system methods”, International Research Journal of Engineering and Technology, (2016).

      [13] Farooq H, “A Review on Cloud Computing Security Using Authentication Techniques”, International Journal of Advanced Research in Computer Science, Vol.8, No.2, (2017).


 

View

Download

Article ID: 24241
 
DOI: 10.14419/ijet.v7i4.36.24241




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.