Full Paper View Go Back

An Improved Authentication Technique with OTP in Cloud Computing

Vishal Paranjape1 , Vimmi Pandey2

Section:Research Paper, Product Type: Isroset-Journal
Vol.1 , Issue.3 , pp.22-26, May-2013


Online published on Jul 07, 2013


Copyright © Vishal Paranjape , Vimmi Pandey . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Vishal Paranjape , Vimmi Pandey, “An Improved Authentication Technique with OTP in Cloud Computing,” International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.3, pp.22-26, 2013.

MLA Style Citation: Vishal Paranjape , Vimmi Pandey "An Improved Authentication Technique with OTP in Cloud Computing." International Journal of Scientific Research in Computer Science and Engineering 1.3 (2013): 22-26.

APA Style Citation: Vishal Paranjape , Vimmi Pandey, (2013). An Improved Authentication Technique with OTP in Cloud Computing. International Journal of Scientific Research in Computer Science and Engineering, 1(3), 22-26.

BibTex Style Citation:
@article{Paranjape_2013,
author = {Vishal Paranjape , Vimmi Pandey},
title = {An Improved Authentication Technique with OTP in Cloud Computing},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {5 2013},
volume = {1},
Issue = {3},
month = {5},
year = {2013},
issn = {2347-2693},
pages = {22-26},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=54},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=54
TI - An Improved Authentication Technique with OTP in Cloud Computing
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Vishal Paranjape , Vimmi Pandey
PY - 2013
DA - 2013/07/07
PB - IJCSE, Indore, INDIA
SP - 22-26
IS - 3
VL - 1
SN - 2347-2693
ER -

4592 Views    4345 Downloads    4227 Downloads
  
  

Abstract :
Today data security plays an important role in the field of software and quality of service, Cloud computing focuses a new challenging security threats. Therefore, a data security model must solve the most challenges of cloud computing security. Cloud computing is a capable technology to make easy development of large-scale, on-demand, flexible computing infrastructures. The concept of cloud computing has changed the view of infrastructure architectures, software delivery and development models. Cloud computing incorporates elements from grid computing, utility computing and autonomic computing to an innovative deployment architecture. This paper presents an overview and the study of the cloud computing. Also include the several security and challenging issues, emerging application and the future trends of cloud computing. To overcome this I use the concept of Mobile OTP for providing authentication, whose purpose is to ensure security in cloud environment.

Key-Words / Index Term :
Cloud computing security, Authentication, OTP, Dynamic Password, Time Synchronization, Information and communication security, Trust

References :
[1] A. Kundu, C. D. Banerjee, P. Saha, “Introducing New Services in Cloud Computing Environment”, International Journal of Digital Content Technology and its Applications, AICIT, Vol. 4, No. 5, pp. 143-152, 2010.
[2] B. Rajkumar, C. Yeo, S. Venugopal, S. Malpani, Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems (2009).
[3] Pring et al., “Forecast: Sizing the cloud; understanding the opportunities in cloud services,” Gartner Inc., Tech. Rep. G00166525, March 2009.
[4] S. Subashini, V. Kavitha, “A survey on security issues in service delivery models of cloud computing”; Journal of Network and Computer Applications, Vol. 34(1), pp 1–11, Academic Press Ltd., UK, 2011, ISSN: 1084-8045.
[5] V. Krishna Reddy, B. Thirumal Rao, Dr. L.S.S. Reddy, P.Sai Kiran “Research Issues in Cloud Computing “ Global Journal of Computer Science and Technology, Volume 11, Issue 11, July 2011.
[6] Shivlal Mewada, Umesh Kumar Singh and Pradeep Kumar Sharma, " A Novel Security Based Model for Wireless Mesh Networks”, ISROSET- IJSRNSC, Vol-1, Issue-1, pp(11-15), March-April 2013.
[7] Shivlal Mewada, Umesh Kumar Singh, Pradeep Sharma,“Security Based Model for Cloud Computing”, Int. Journal of Computer Networks and Wireless Communications (IJCNWC), Vol. 1, No. 1, pp (13-19), December 2011.
[8] Rajesh Piplode, et al. , “Study of Threats, Risk and Challenges in Cloud Computing”, IJSRCSE Vol-1, issue-1 pp (26-30) Jan- Feb 2013

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation