Data Security in Cloud Computing Using Three-Factor Authentication

4Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud storage is tremendously increasing its services, huge range of storage and communication of massive data over network. This practically has an adverse effect on the way of upholding this data, when it especially comes to the privacy of the user-secured and highly confidential data. We first view you with a system that is vulnerable to this authentication protocol with its misuse of biometrics and incorrect password generates no user to lost the mobile device. We even went along with this scheme and gave out a major issue to overcome with impersonation attack. However, this scheme makes the way easy to attack for offline password guessing attack. We included a three-factor authentication which carries the smart card into card reader, gets the password and identity and conveys the user details’ requesting time. We then came up with a scheme to overcome these security flaws of this prescribed authentication scheme combining passwords, mobile devices and biometrics. The proposed system is robust three-factor authentication with the help of password, biometrics and mobile device which provides reliable security strength to the user’s data and makes counterattack to existing attack, giving with more benefits compared to the previous scheme. This scheme will not only encounters with the security issues, but also provides with most enhanced security functionalities.

Cite

CITATION STYLE

APA

Nalajala, S., Moukthika, B., Kaivalya, M., Samyuktha, K., & Pratap, N. L. (2020). Data Security in Cloud Computing Using Three-Factor Authentication. In Lecture Notes in Electrical Engineering (Vol. 637, pp. 343–354). Springer. https://doi.org/10.1007/978-981-15-2612-1_33

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free