Full Paper View Go Back

Securing the Cloud Environment Using OTP

Vimmi Pandey1

Section:Review Paper, Product Type: Isroset-Journal
Vol.1 , Issue.4 , pp.38-43, Jul-2013


Online published on Aug 31, 2013


Copyright © Vimmi Pandey . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Vimmi Pandey, “Securing the Cloud Environment Using OTP,” International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.4, pp.38-43, 2013.

MLA Style Citation: Vimmi Pandey "Securing the Cloud Environment Using OTP." International Journal of Scientific Research in Computer Science and Engineering 1.4 (2013): 38-43.

APA Style Citation: Vimmi Pandey, (2013). Securing the Cloud Environment Using OTP. International Journal of Scientific Research in Computer Science and Engineering, 1(4), 38-43.

BibTex Style Citation:
@article{Pandey_2013,
author = {Vimmi Pandey},
title = {Securing the Cloud Environment Using OTP},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {7 2013},
volume = {1},
Issue = {4},
month = {7},
year = {2013},
issn = {2347-2693},
pages = {38-43},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=73},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=73
TI - Securing the Cloud Environment Using OTP
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Vimmi Pandey
PY - 2013
DA - 2013/08/31
PB - IJCSE, Indore, INDIA
SP - 38-43
IS - 4
VL - 1
SN - 2347-2693
ER -

4385 Views    4307 Downloads    4243 Downloads
  
  

Abstract :
In today’s scenario, websites have been converted from just a display of information into an online transaction in the form of goods, services, or money. Along with development, the security of the website is also need to be tightened, not just rely on usernames and passwords but also to the dynamic code of the mobile token which is difficult to be cracked. Dynamic mobile token is an application which is planted in the mobile phone to generate a code that was formed by the method of one time password and can only be used for one login session or transaction. Each mobile token has a value in the "secret" variable that makes it unique or different from the others, to separate one user access transactions or personal page.

Key-Words / Index Term :
One Time Password, MD5 Algorithm, Website Security, Authentication, Mobile Token

References :
[1] Dr. Mark D. Bedworth PhD BSc FSS. February 2008. A Theory of Probabilistic One-Time Password. Computer Science Computer Engineering and Applied Computing, Security and Management.
[2] Kiddo. 2010. Hacking Website: Menemukan Celah Keamanan & Melindungi Website dari Serangan Hacker. Mediakita
[3] Rivest, Ronald L. 1992.The MD5 Message Digest Algorithm.
[4] Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, “ Security Enhancement in Cloud Computing (CC)”, IJSRCSE, Volume-01 , Issue-01, Page No : 31-37 3013
[5] Rajesh Piplode, Pradeep Sharma and Umesh Kumar Singh , “Study of Threats, Risk and Challenges in Cloud Computing”, IJSRCSE, Volume-01 , Issue-01, Page No : 26- 30, 2013
[6] Vishal Paranjape and Vimmi Pandey’ “ An Improved Authentication Technique with OTP in Cloud Computing” IJSRCSE, Volume-01 , Issue-03, Page No : 22-26, 2013
[7] “Privacy and consumer risks in cloud computing”, Dan Svantesson, Roger Clarke, computer law & security review 26 (2010 ) 391e97, @ 2010 Svantesson & Clarke. Published by Elsevier Ltd. doi:10.1016/j.clsr.2010.05.005.
[8] N. Haller, Bellcore, and C. Metz. 1996. A One-Time Password System. Kaman Sciences Corporation.
[9] Fadi Aloul, Syed Zahidi, Wassim El-Hajj. 2009. Two Factor Authentication Using Mobile Phones. Digital Library Telkom Institute of Technology (IEEE).
[10] Arya Sapoetra Y. June 2010. Rancang Bangun Arsitektur Library Sistem Autentikasi One Time Password Menggunakan Prosedur Challenge-Response. Informatics Engineering, Pembangunan Nasional “Veteran” University, East Java.
[11] C.W. Lin, J. J. Shen, and M. S. Hwang, "Security enhancement for optimal strong password authentication protocol," ACM Operating Systems Review, vol. 37, no. 2, pp. 7-12, April 2003.
[12] “Dynamic Authentication: Need than a Choice”, A. Saxena, Communication Systems Software and Middleware and Workshops, 2008. COMSWARE 2008. 3rd International Conference, 10 (1) (2008), 214, IEEE conference.
[13] “Eliminating Vulnerable Attacks Using One-Time Password and PassText – Analytical Study of Blended Schema” M. Viju Prakash, P. Alwin Infant and S. Jeya Shobana, IJCA Proceedings on International Conference on VLSI, Communications and Instrumentation (ICVCI) (2):35–41, 2011. Published by Foundation of Computer Science.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation