SlideShare a Scribd company logo
1 of 7
Download to read offline
This article can be downloaded from http://www.iajavs.com/currentissue.php
1
This article can be downloaded from http://www.iajavs.com/currentissue.php
2
Indo-Am. J. Agric. & Vet. Sci., 2021 ISSN 2321–9602 www.iajavs.com
Vol. 9, Issuse 1, Jan 2021
© 2015 Meghana Publications. All Rights Reserved
FINE-GRAINED TWO-FACTOR ACCESS CONTROL FOR
WEB-BASED CLOUD COMPUTING SERVICES
V.LAVANYA1, G.LAKSHMIKANTH2
1M.Tech, Dept of CSE, Sree Rama Engineering College, Tirupati, AP, India.
2Associate Professor & HOD, Dept of CSE, Sree Rama Engineering College, Tirupati, AP, India.
Abstract – For web-based cloud computing services, we provide a novel, finely grained approach of
two-factor authentication (2FA). Specifically, in our proposed 2FA access control system, a user secret
key and a lightweight security device are required to create an attribute-based access control
mechanism. It is possible that the technique, which prevents users from accessing the system unless
they have both, might increase the system's security, particularly when several users share a computer
for web-based cloud services. It is also possible to limit access to just those users who share a set of
qualities, while ensuring user privacy, since the cloud server only knows that the user meets the
requisite predicate, but it does not know their actual identity. Finally, we run a simulation to show that
our suggested 2FA system is feasible.
I. INTRODUCTION
Computer hardware and software are provided
as a service over a network in "the cloud" (the
term used to describe the concept) (typically
the Internet). As a system diagram symbol, a
cloud-shaped cloud is often used as an
abstraction for the complicated infrastructure it
represents. A user's data, software, and
processing are transferred to a third-party
service through cloud computing. The term
"cloud computing" refers to the use of
computer resources that may be accessed
through the Internet and controlled by a third
party. A wide range of high-end server
computer networks and high-end software
programmes may be accessed using these
services.
It is possible to distribute data processing tasks
among a large number of low-cost consumer
PCs connected through specialised networks in
the cloud. All of the computers in the shared IT
infrastructure are connected to one another. In
order to get the most out of cloud computing,
virtualization is often used.
In accordance with NIST's criteria, the following
are some of the most significant features of
cloud computing:
II. It is possible for a customer to supply
computer capabilities, such as server time and
network storage, on demand without needing
human intervention from each service's
supplier.
III. Capabilities are made accessible across
the network and accessed via standard
protocols that encourage their usage by diverse
thin or thick client systems (e.g., mobile phones,
laptops, and PDAs).
IV. Providers use a multi-tenant approach
in which distinct physical and virtual resources
are constantly allocated and reassigned based
on client demand for computing resources. It's
possible to declare a place at a higher level of
abstraction while still maintaining a feeling of
location independence since the customer
This article can be downloaded from http://www.iajavs.com/currentissue.php
3
typically has no control or knowledge of the
specific location of the delivered resources (e.g.,
country, state, or data center). Virtual
machines, storage, computation, and network
bandwidth are all examples of resources.
Capabilities may be supplied fast and elastically,
sometimes automatically, to enable rapid
scaling out and expansion. Consumers generally
believe that provisioning capabilities are
boundless and may be acquired at any moment,
in any number.
VVI. Using a metering capability relevant to
the kind of service, cloud systems may
automatically regulate and optimise resource
utilisation (e.g., storage, processing, bandwidth,
and active user accounts). The use of resources
may be monitored, regulated, and reported,
allowing both the supplier and the user of the
service to be transparent. Errors are discovered
during testing. Work products must be
thoroughly tested before they can be released
to the general public. You may use it to verify
the performance of components, sub-
component, assembly, and/or a final product's
functionality In order to ensure that the
Software system satisfies its requirements and
user expectations and doesn't fail in an
undesirable way, it is put through its paces by
doing software exercises. There are a variety of
tests available. Each test type is designed to
meet a certain need.
VII. SYSTEM ANALYSIS
A. EXISTING SYSTEM
Concerns around security and privacy for web-
based cloud services have emerged as a result
of the cloud computing paradigm shift. User
authentication has become an essential part of
any cloud system because sensitive data may be
kept in the cloud for sharing purposes or quick
access; and qualified users may also use the
cloud system for different apps and services.
Before utilising cloud services or gaining access
to sensitive data stored in the cloud, users must
first check in. The typical account/password-
based approach has two flaws.
There are certain issues with the current
system:
1) First and foremost, the old method of
account/password authentication does not
protect users' personal information. Cloud
computing solutions must, however, take
privacy into account as a critical aspect.
In addition to this, it is normal for many
individuals to use the same computer at once.
Installing spyware to steal a user's login
password from their web browser may be a
simple task for hackers.
3) Even if a password is used to secure the
computer, malware that has not been identified
may still guess the password and take control of
the machine.
B. THE SYSTEM I'M TALKING ABOUT
A lightweight security device is used in this
research to propose a fine-grained two-factor
access control mechanism for web-based cloud
computing services. The following
characteristics describe the gadget: A tamper-
resistant design means that no one can break
into it to acquire the secret information held
inside, and it can perform certain lightweight
algorithms, such as hashing and exponentiation.
The Proposed System's Benefits:
Our system has a two-factor authentication
(2FA) feature.
A key feature of our protocol is the ability to
create multiple access permissions depending
on different conditions and offer the system
with significant flexibility. In the meanwhile, the
user's privacy is protected.
THE ARCHITECTURE OF THE SYSTEM
It is the interface between the user and the
information system. There are a variety of ways
to enter data into a computer, including reading
it from a written or printed document or having
humans input it directly into the system. This
includes defining specifications and processes
for data preparation. The goal of input design is
to maintain the process as easy as possible
while also reducing the quantity of input
necessary, reducing mistakes, and preventing
delays. The input is set up in such a manner that
it offers convenience and security while also
This article can be downloaded from http://www.iajavs.com/currentissue.php
4
DATA FLOW DIAGRAM:
DFD is another name for the bubble chart. For
example, it is possible to express a system in
terms of input data, processing of this data, and
output of this data created by this system in a
simple graphical formalism.
2) One of the most essential modelling tools is
the data flow diagram (DFD). Models the
system's components. External entities that
interact with and utilise system data as well as
internal information flow are all included in this
list.
3) DFD illustrates the information flow and
changes that occur when data passes through
the system. It's a visual representation of how
data goes from input to output and the
modifications that take place along the way.
4) DFD is sometimes referred to as a "bubble
chart." A DFD may be used at any level of
abstraction to depict a system. DFD may be
broken down into a series of levels that indicate
increasing degrees of information flow and
operational depth.
UML DIAGRAMS
The acronym UML refers to a standard
modelling language. UML is an object-oriented
software engineering modelling language that is
widely used. The Object Management Group is
in charge of overseeing and developing the
standard.
It is hoped that the use of UML would lead to
the widespread adoption of object-oriented
computer software models. There are two main
parts to UML right now: a Meta-model and a
notation. A method or process may also be
added to or related with UML in the future.
There is a common language for describing,
visualising, building and documenting software
system artefacts and other non-software
system models called the Unified Modeling
Language (UML).
Modeling huge and complicated systems has
been made easier with the use of the Unified
Modeling Language (UML).
An essential aspect of object-oriented software
development is the use of the UML. A large
portion of the UML's notation is based on
graphical representations of software designs.
GOALS:
The following are the primary aims of the UML
design:
An expressive visual modelling language should
be available for users to create and trade
meaningful models.
Give the key principles the flexibility and
specialisation they need.
3) Be able to work with a variety of
programming languages and frameworks.
This article can be downloaded from http://www.iajavs.com/currentissue.php
5
Formalize the modelling language and make it
easier for students to grasp its idioms
Make it easier for people to get into the OO
tools market.
6) Allow for higher-level notions like
collaborations, frameworks, patterns, and
components to be implemented in your
application.
Integrate the best practises.
CASE DIAGRAM:
Diagrams in the Unified Modeling Language
(UML) based on use cases are known as use
cases in the UML. Use cases, actors, and any
relationships between them are all depicted
graphically to provide a clear picture of the
system's capabilities. A use case diagram's
primary goal is to explain how the system
performs for each actor. System actors may be
portrayed by their responsibilities in the
system.
USE CASE DIAGRAM:
Diagrams in the Unified Modeling Language
(UML) based on use cases are known as use
cases in the UML. Use cases, actors, and any
relationships between them are all depicted
graphically to provide a clear picture of the
system's capabilities. A use case diagram's
primary goal is to explain how the system
performs for each actor. System actors may be
portrayed by their responsibilities in the
system.
CLASS DIAGRAM:
In software engineering, a class diagram in the
Unified Modeling Language (UML) is a type of
static structure diagram that describes the
structure of a system by showing the system's
classes, their attributes, operations (or
methods), and the relationships among the
classes. It explains which class contains
information.
SEQUENCE DIAGRAM:
In the Unified Modeling Language (UML), a
sequence diagram depicts the order in which
processes interact with one another. A Message
Sequence Chart is the basis for this diagram.
Some people call sequence diagrams event
diagrams, events scenarios, or timing diagrams,
depending on the context.
It provides services to anonymous authorized
users. It interacts with the user during the
authentication process.
This article can be downloaded from http://www.iajavs.com/currentissue.php
6
ACTIVITY DIAGRAM:
Activity diagrams are visual representations of
processes that include choice, iteration, and
concurrency as well as sequential tasks and
actions. For example, activity diagrams may be
used to depict the step-by-step operational
processes of system components in the Unified
Modeling Language (UML). The complete
control flow may be seen using an activity
diagram.
MODULES
We have four modules in this implementation:
Attribute Authorization Module (AAM)
3) The User Module.
4) Provider Module for Cloud Services
The following is a summary of the content in
this module:
Trustee:
System settings are generated and the security
device is initialised.
The source of the attribution:
For each user, it generates a unique user secret
key based on their qualities.
User:
The player is in charge of establishing an
encrypted connection to the cloud server. All
users have access to a secret key granted by the
attribute-issuing authority, and a security
device that has been initialised by the trustee.
Provider of Cloud Computing:
CONCLUSION
In this research, we provide a novel 2FA (two-
factor authentication) access control solution
for web-based cloud computing services that
includes both a user secret key and a
lightweight security device. By using a two-
factor authentication (2FA) access control
system, the cloud server may limit access to just
those users who have the same set of qualities,
while simultaneously safeguarding the privacy
of those users' personal information. The
suggested 2FA access control system has been
thoroughly analysed in terms of security and is
found to meet the necessary levels of security.
We were able to establish that the construction
is "viable" through performance assessment.
We leave it up to the future to increase the
system's efficiency while retaining all of its
pleasant features.
REFERENCES
[1] In the first place, there's A. Kapadia and
M. H Au. No need for TTPS with PERM's
reputation-based blacklisting. The ACM
Conference on Computer and Communications
Security (CCS'12), held in Raleigh, NC, USA from
October 16-18, 2012, was edited by T. Yu, G.
Danezis and V. D. Gligor. ACM, the year in
question is 2012.
[2] In addition to Au, Kapadia and W. Susilo
[2, 3], Ttp-free, anonymous, blacklistable
credentials with reputation are known as Blacr.
This article can be downloaded from http://www.iajavs.com/currentissue.php
7
The Internet Society, 2012, in NDSS (National
Digital Standards Society).
[3] The Constant-Size Dynamic k-TAA. M. H.
Au, W Susilo, and Y. In Lecture Notes in
Computer Science, Volume 4116, Pages 111–
125. New York City, 2006.
[4] This study was conducted by four
researchers: Baek, Vu, Liu, and Xiang in
collaboration with Baek, Baek, and Xiang. A
smart grid data management architecture
based on secure cloud computing. Computing in
the Cloud, 3(2):233–244, IEEE Transactions on.
[5] M. Bellare and O. Goldreich,
respectively. Knowledge proofs are defined.
Lecture Notes in Computer Science 740:
CRYPTO, pages 390–391
[6] Springer, 1992, p. 420; reprint.
[7] Sixth Generation: J. Bethencourt, A.
Sahai, & B. Waters Encryption based on
ciphertext policy attributes. Presented at the
IEEE Symposium on Security and Privacy, 321–
333. Computer Society of the IEEE, 2007.
[8] D. Boneh, X. Boyen, and H. Shacham are
three of the authors. The signatures of a small
group. Referenced in Franklin [19], particularly
pages 41–55.
[9] Boneh, Boneh, and Tsudik. The ability to
fine-tune security measures. (2004) 4(1):60–82
of the ACM Transactions on Internet
Technology
[10] According to [9] J. Camenisch, Discrete
Logarithm Problem-Based Group Signature
Schemes for Payment Systems. thesis
completed in 1998 at the Swiss Federal Institute
of Technology (ETH). Reprint as ETH Series in
Information Security and Cryptography, vol. 2,
Hartung-Gorre Verlag, Konstanz, ISBN 3-89649-
286-1, 1998.
[11]
J. Camenisch, M. Dubovitskaya, and G. Neven
are the authors. Transfer with access control
that is blind. This paper was published in the
Proceedings of the 2009 ACM Conference on
Computer and Communications Security (CCS
2009), which was held in Chicago from
November 9–13, 2009. It was co-authored by S.
Jha and A. D. Keromytis. In 2009, the ACM.

More Related Content

Similar to publishable paper

Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
idescitation
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
Editor IJARCET
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
Editor IJARCET
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
 

Similar to publishable paper (20)

Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
Download
DownloadDownload
Download
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
TermPaper
TermPaperTermPaper
TermPaper
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 

More from chaitanya451336

More from chaitanya451336 (20)

journals in research
journals in researchjournals in research
journals in research
 
journalism research
journalism researchjournalism research
journalism research
 
journals to publish paper
journals to publish paperjournals to publish paper
journals to publish paper
 
published research
published researchpublished research
published research
 
published research
published researchpublished research
published research
 
published research
published researchpublished research
published research
 
journal publishers
journal publishersjournal publishers
journal publishers
 
journal for research
journal for researchjournal for research
journal for research
 
original research papers
original research papersoriginal research papers
original research papers
 
journalism research
journalism researchjournalism research
journalism research
 
journal research paper
journal research paperjournal research paper
journal research paper
 
journal paper publication
journal paper publicationjournal paper publication
journal paper publication
 
journals to publish paper
journals to publish paperjournals to publish paper
journals to publish paper
 
journal for research
journal for researchjournal for research
journal for research
 
research publish journal
research publish journalresearch publish journal
research publish journal
 
journals in research
journals in researchjournals in research
journals in research
 
materials science journal
materials science journalmaterials science journal
materials science journal
 
research on journaling
research on journalingresearch on journaling
research on journaling
 
all journal
all journalall journal
all journal
 
journal research paper
journal research paperjournal research paper
journal research paper
 

Recently uploaded

Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
vineshkumarsajnani12
 
Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...
DUBAI (+971)581248768 BUY ABORTION PILLS IN ABU dhabi...Qatar
 
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
bleessingsbender
 
2024 May - Clearbit Integration with Hubspot - Greenville HUG.pptx
2024 May - Clearbit Integration with Hubspot  - Greenville HUG.pptx2024 May - Clearbit Integration with Hubspot  - Greenville HUG.pptx
2024 May - Clearbit Integration with Hubspot - Greenville HUG.pptx
Boundify
 

Recently uploaded (20)

Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
PALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTS
PALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTSPALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTS
PALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTS
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
10 Influential Leaders Defining the Future of Digital Banking in 2024.pdf
10 Influential Leaders Defining the Future of Digital Banking in 2024.pdf10 Influential Leaders Defining the Future of Digital Banking in 2024.pdf
10 Influential Leaders Defining the Future of Digital Banking in 2024.pdf
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
 
UJJAIN CALL GIRL ❤ 8272964427❤ CALL GIRLS IN UJJAIN ESCORTS SERVICE PROVIDE
UJJAIN CALL GIRL ❤ 8272964427❤ CALL GIRLS IN UJJAIN ESCORTS SERVICE PROVIDEUJJAIN CALL GIRL ❤ 8272964427❤ CALL GIRLS IN UJJAIN ESCORTS SERVICE PROVIDE
UJJAIN CALL GIRL ❤ 8272964427❤ CALL GIRLS IN UJJAIN ESCORTS SERVICE PROVIDE
 
Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
2024 May - Clearbit Integration with Hubspot - Greenville HUG.pptx
2024 May - Clearbit Integration with Hubspot  - Greenville HUG.pptx2024 May - Clearbit Integration with Hubspot  - Greenville HUG.pptx
2024 May - Clearbit Integration with Hubspot - Greenville HUG.pptx
 
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDEJIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
 
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptxGoal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
 
The Art of Decision-Making: Navigating Complexity and Uncertainty
The Art of Decision-Making: Navigating Complexity and UncertaintyThe Art of Decision-Making: Navigating Complexity and Uncertainty
The Art of Decision-Making: Navigating Complexity and Uncertainty
 
A DAY IN THE LIFE OF A SALESPERSON .pptx
A DAY IN THE LIFE OF A SALESPERSON .pptxA DAY IN THE LIFE OF A SALESPERSON .pptx
A DAY IN THE LIFE OF A SALESPERSON .pptx
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 

publishable paper

  • 1. This article can be downloaded from http://www.iajavs.com/currentissue.php 1
  • 2. This article can be downloaded from http://www.iajavs.com/currentissue.php 2 Indo-Am. J. Agric. & Vet. Sci., 2021 ISSN 2321–9602 www.iajavs.com Vol. 9, Issuse 1, Jan 2021 © 2015 Meghana Publications. All Rights Reserved FINE-GRAINED TWO-FACTOR ACCESS CONTROL FOR WEB-BASED CLOUD COMPUTING SERVICES V.LAVANYA1, G.LAKSHMIKANTH2 1M.Tech, Dept of CSE, Sree Rama Engineering College, Tirupati, AP, India. 2Associate Professor & HOD, Dept of CSE, Sree Rama Engineering College, Tirupati, AP, India. Abstract – For web-based cloud computing services, we provide a novel, finely grained approach of two-factor authentication (2FA). Specifically, in our proposed 2FA access control system, a user secret key and a lightweight security device are required to create an attribute-based access control mechanism. It is possible that the technique, which prevents users from accessing the system unless they have both, might increase the system's security, particularly when several users share a computer for web-based cloud services. It is also possible to limit access to just those users who share a set of qualities, while ensuring user privacy, since the cloud server only knows that the user meets the requisite predicate, but it does not know their actual identity. Finally, we run a simulation to show that our suggested 2FA system is feasible. I. INTRODUCTION Computer hardware and software are provided as a service over a network in "the cloud" (the term used to describe the concept) (typically the Internet). As a system diagram symbol, a cloud-shaped cloud is often used as an abstraction for the complicated infrastructure it represents. A user's data, software, and processing are transferred to a third-party service through cloud computing. The term "cloud computing" refers to the use of computer resources that may be accessed through the Internet and controlled by a third party. A wide range of high-end server computer networks and high-end software programmes may be accessed using these services. It is possible to distribute data processing tasks among a large number of low-cost consumer PCs connected through specialised networks in the cloud. All of the computers in the shared IT infrastructure are connected to one another. In order to get the most out of cloud computing, virtualization is often used. In accordance with NIST's criteria, the following are some of the most significant features of cloud computing: II. It is possible for a customer to supply computer capabilities, such as server time and network storage, on demand without needing human intervention from each service's supplier. III. Capabilities are made accessible across the network and accessed via standard protocols that encourage their usage by diverse thin or thick client systems (e.g., mobile phones, laptops, and PDAs). IV. Providers use a multi-tenant approach in which distinct physical and virtual resources are constantly allocated and reassigned based on client demand for computing resources. It's possible to declare a place at a higher level of abstraction while still maintaining a feeling of location independence since the customer
  • 3. This article can be downloaded from http://www.iajavs.com/currentissue.php 3 typically has no control or knowledge of the specific location of the delivered resources (e.g., country, state, or data center). Virtual machines, storage, computation, and network bandwidth are all examples of resources. Capabilities may be supplied fast and elastically, sometimes automatically, to enable rapid scaling out and expansion. Consumers generally believe that provisioning capabilities are boundless and may be acquired at any moment, in any number. VVI. Using a metering capability relevant to the kind of service, cloud systems may automatically regulate and optimise resource utilisation (e.g., storage, processing, bandwidth, and active user accounts). The use of resources may be monitored, regulated, and reported, allowing both the supplier and the user of the service to be transparent. Errors are discovered during testing. Work products must be thoroughly tested before they can be released to the general public. You may use it to verify the performance of components, sub- component, assembly, and/or a final product's functionality In order to ensure that the Software system satisfies its requirements and user expectations and doesn't fail in an undesirable way, it is put through its paces by doing software exercises. There are a variety of tests available. Each test type is designed to meet a certain need. VII. SYSTEM ANALYSIS A. EXISTING SYSTEM Concerns around security and privacy for web- based cloud services have emerged as a result of the cloud computing paradigm shift. User authentication has become an essential part of any cloud system because sensitive data may be kept in the cloud for sharing purposes or quick access; and qualified users may also use the cloud system for different apps and services. Before utilising cloud services or gaining access to sensitive data stored in the cloud, users must first check in. The typical account/password- based approach has two flaws. There are certain issues with the current system: 1) First and foremost, the old method of account/password authentication does not protect users' personal information. Cloud computing solutions must, however, take privacy into account as a critical aspect. In addition to this, it is normal for many individuals to use the same computer at once. Installing spyware to steal a user's login password from their web browser may be a simple task for hackers. 3) Even if a password is used to secure the computer, malware that has not been identified may still guess the password and take control of the machine. B. THE SYSTEM I'M TALKING ABOUT A lightweight security device is used in this research to propose a fine-grained two-factor access control mechanism for web-based cloud computing services. The following characteristics describe the gadget: A tamper- resistant design means that no one can break into it to acquire the secret information held inside, and it can perform certain lightweight algorithms, such as hashing and exponentiation. The Proposed System's Benefits: Our system has a two-factor authentication (2FA) feature. A key feature of our protocol is the ability to create multiple access permissions depending on different conditions and offer the system with significant flexibility. In the meanwhile, the user's privacy is protected. THE ARCHITECTURE OF THE SYSTEM It is the interface between the user and the information system. There are a variety of ways to enter data into a computer, including reading it from a written or printed document or having humans input it directly into the system. This includes defining specifications and processes for data preparation. The goal of input design is to maintain the process as easy as possible while also reducing the quantity of input necessary, reducing mistakes, and preventing delays. The input is set up in such a manner that it offers convenience and security while also
  • 4. This article can be downloaded from http://www.iajavs.com/currentissue.php 4 DATA FLOW DIAGRAM: DFD is another name for the bubble chart. For example, it is possible to express a system in terms of input data, processing of this data, and output of this data created by this system in a simple graphical formalism. 2) One of the most essential modelling tools is the data flow diagram (DFD). Models the system's components. External entities that interact with and utilise system data as well as internal information flow are all included in this list. 3) DFD illustrates the information flow and changes that occur when data passes through the system. It's a visual representation of how data goes from input to output and the modifications that take place along the way. 4) DFD is sometimes referred to as a "bubble chart." A DFD may be used at any level of abstraction to depict a system. DFD may be broken down into a series of levels that indicate increasing degrees of information flow and operational depth. UML DIAGRAMS The acronym UML refers to a standard modelling language. UML is an object-oriented software engineering modelling language that is widely used. The Object Management Group is in charge of overseeing and developing the standard. It is hoped that the use of UML would lead to the widespread adoption of object-oriented computer software models. There are two main parts to UML right now: a Meta-model and a notation. A method or process may also be added to or related with UML in the future. There is a common language for describing, visualising, building and documenting software system artefacts and other non-software system models called the Unified Modeling Language (UML). Modeling huge and complicated systems has been made easier with the use of the Unified Modeling Language (UML). An essential aspect of object-oriented software development is the use of the UML. A large portion of the UML's notation is based on graphical representations of software designs. GOALS: The following are the primary aims of the UML design: An expressive visual modelling language should be available for users to create and trade meaningful models. Give the key principles the flexibility and specialisation they need. 3) Be able to work with a variety of programming languages and frameworks.
  • 5. This article can be downloaded from http://www.iajavs.com/currentissue.php 5 Formalize the modelling language and make it easier for students to grasp its idioms Make it easier for people to get into the OO tools market. 6) Allow for higher-level notions like collaborations, frameworks, patterns, and components to be implemented in your application. Integrate the best practises. CASE DIAGRAM: Diagrams in the Unified Modeling Language (UML) based on use cases are known as use cases in the UML. Use cases, actors, and any relationships between them are all depicted graphically to provide a clear picture of the system's capabilities. A use case diagram's primary goal is to explain how the system performs for each actor. System actors may be portrayed by their responsibilities in the system. USE CASE DIAGRAM: Diagrams in the Unified Modeling Language (UML) based on use cases are known as use cases in the UML. Use cases, actors, and any relationships between them are all depicted graphically to provide a clear picture of the system's capabilities. A use case diagram's primary goal is to explain how the system performs for each actor. System actors may be portrayed by their responsibilities in the system. CLASS DIAGRAM: In software engineering, a class diagram in the Unified Modeling Language (UML) is a type of static structure diagram that describes the structure of a system by showing the system's classes, their attributes, operations (or methods), and the relationships among the classes. It explains which class contains information. SEQUENCE DIAGRAM: In the Unified Modeling Language (UML), a sequence diagram depicts the order in which processes interact with one another. A Message Sequence Chart is the basis for this diagram. Some people call sequence diagrams event diagrams, events scenarios, or timing diagrams, depending on the context. It provides services to anonymous authorized users. It interacts with the user during the authentication process.
  • 6. This article can be downloaded from http://www.iajavs.com/currentissue.php 6 ACTIVITY DIAGRAM: Activity diagrams are visual representations of processes that include choice, iteration, and concurrency as well as sequential tasks and actions. For example, activity diagrams may be used to depict the step-by-step operational processes of system components in the Unified Modeling Language (UML). The complete control flow may be seen using an activity diagram. MODULES We have four modules in this implementation: Attribute Authorization Module (AAM) 3) The User Module. 4) Provider Module for Cloud Services The following is a summary of the content in this module: Trustee: System settings are generated and the security device is initialised. The source of the attribution: For each user, it generates a unique user secret key based on their qualities. User: The player is in charge of establishing an encrypted connection to the cloud server. All users have access to a secret key granted by the attribute-issuing authority, and a security device that has been initialised by the trustee. Provider of Cloud Computing: CONCLUSION In this research, we provide a novel 2FA (two- factor authentication) access control solution for web-based cloud computing services that includes both a user secret key and a lightweight security device. By using a two- factor authentication (2FA) access control system, the cloud server may limit access to just those users who have the same set of qualities, while simultaneously safeguarding the privacy of those users' personal information. The suggested 2FA access control system has been thoroughly analysed in terms of security and is found to meet the necessary levels of security. We were able to establish that the construction is "viable" through performance assessment. We leave it up to the future to increase the system's efficiency while retaining all of its pleasant features. REFERENCES [1] In the first place, there's A. Kapadia and M. H Au. No need for TTPS with PERM's reputation-based blacklisting. The ACM Conference on Computer and Communications Security (CCS'12), held in Raleigh, NC, USA from October 16-18, 2012, was edited by T. Yu, G. Danezis and V. D. Gligor. ACM, the year in question is 2012. [2] In addition to Au, Kapadia and W. Susilo [2, 3], Ttp-free, anonymous, blacklistable credentials with reputation are known as Blacr.
  • 7. This article can be downloaded from http://www.iajavs.com/currentissue.php 7 The Internet Society, 2012, in NDSS (National Digital Standards Society). [3] The Constant-Size Dynamic k-TAA. M. H. Au, W Susilo, and Y. In Lecture Notes in Computer Science, Volume 4116, Pages 111– 125. New York City, 2006. [4] This study was conducted by four researchers: Baek, Vu, Liu, and Xiang in collaboration with Baek, Baek, and Xiang. A smart grid data management architecture based on secure cloud computing. Computing in the Cloud, 3(2):233–244, IEEE Transactions on. [5] M. Bellare and O. Goldreich, respectively. Knowledge proofs are defined. Lecture Notes in Computer Science 740: CRYPTO, pages 390–391 [6] Springer, 1992, p. 420; reprint. [7] Sixth Generation: J. Bethencourt, A. Sahai, & B. Waters Encryption based on ciphertext policy attributes. Presented at the IEEE Symposium on Security and Privacy, 321– 333. Computer Society of the IEEE, 2007. [8] D. Boneh, X. Boyen, and H. Shacham are three of the authors. The signatures of a small group. Referenced in Franklin [19], particularly pages 41–55. [9] Boneh, Boneh, and Tsudik. The ability to fine-tune security measures. (2004) 4(1):60–82 of the ACM Transactions on Internet Technology [10] According to [9] J. Camenisch, Discrete Logarithm Problem-Based Group Signature Schemes for Payment Systems. thesis completed in 1998 at the Swiss Federal Institute of Technology (ETH). Reprint as ETH Series in Information Security and Cryptography, vol. 2, Hartung-Gorre Verlag, Konstanz, ISBN 3-89649- 286-1, 1998. [11] J. Camenisch, M. Dubovitskaya, and G. Neven are the authors. Transfer with access control that is blind. This paper was published in the Proceedings of the 2009 ACM Conference on Computer and Communications Security (CCS 2009), which was held in Chicago from November 9–13, 2009. It was co-authored by S. Jha and A. D. Keromytis. In 2009, the ACM.