SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 3 Issue 6, October 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD28037 | Volume – 3 | Issue – 6 | September - October 2019 Page 89
Secure One Time Password (OTP) Generation for user
Authentication in Cloud Environment
Kyaw Swar Hlaing1, Nay Aung Aung2
1Assistant Lecturer, Faculty of Computer System and Technology,
1Myanmar Institute of Information Technology, Mandalay, Myanmar
2Lecturer, Information Technology Support and Maintenance Department,
2University of Computer Studies, Mandalay, Myanmar
ABSTRACT
Cloud computing is one of today’s most exciting technologies due to its ability
to reduce cost associated with computing. This technology worldwide usedto
improve the business infrastructure and performance. The major threat that
the cloud is facing now is security. So, the user authentication is very
important step in cloud environment. The traditional authentication (user
name and static password or PIN code) can be easily broken by the skillful
attacker. An Unauthorized user can easilyenterintothesystemifheknowsthe
user credentials. Encryption algorithms play a main role in information
security systems. Efficient password generation for user authentication is an
important problem in secure Cloud communications. In the paper, the One
Time Password (OTP) approach is used to authenticate the cloud users. The
generated OPT is encrypted by RSA public key encryption to be more secure
for the cloud user authentication. So the third partyisnot requiredtogenerate
OPT in the proposed paper. This paper can help to solve the user
authentication problem in Cloud environment.
KEYWORDS: Cloud computing, user authentication, password generation, OTP,
RSA
How to cite this paper: KyawSwarHlaing
| Nay Aung Aung "Secure One Time
Password (OTP) Generation for user
Authentication in Cloud Environment"
Published in
International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-6, October
2019, pp.89-92, URL:
https://www.ijtsrd.com/papers/ijtsrd28
037.pdf
Copyright © 2019 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
1. INTRODUCTION
Cloud computing is the communal term for a group of IT
technologies which in teamwork are changingthelandscape
of how IT services are provided, accessed and paidfor.Some
of the supporting technologies have already been available
for quite some time, but it is the combination of several
technologies which enables a whole new way of using IT.
Cloud computing is a model for enabling convenient, on-
demand network access to a shared pool of configurable
computing resources (e.g., networks, servers, storage,
applications, services) that can be rapidly provisioned and
released with minimal management effort or service
provider interaction. The concept of Cloud Computing
revolves around distributed architecture that centralizes
server resources on a scalable platform so as to provide on
demand computing resources and services. Cloud platforms
are offered by the Cloud service providers (CSP’s) for their
customers to use and create their web services, much like
internet service providers offer costumers high speed
broadband to access the internet. CSPs and ISPs (Internet
Service Providers) both offer services. Cloud providersoffer
three types of services i.e.
1. Software as a Service (SaaS),
2. Platform as a Service (PaaS)
3. Infrastructure as a Service (IaaS)
In addition, organizations can easily meet the needs of
rapidly changing markets to ensure that they are always on
the leading edge for their consumers. The clients of
commercial cloudsrentcomputing power(virtual machines)
or storage space (virtual space) dynamically, according to
the needs of their business. With the exploit of this
technology, users can access heavy applications via
lightweight portable devices such as mobilephones,PCsand
PDAs. There are also fourdifferentclouddeploymentmodels
namely.
1. Private cloud. The cloud infrastructure is operated for a
private organization. It may be managed by the
organization or a third party, and may exist on premise
or off premise.
2. Community cloud. The cloud infrastructure is sharedby
several organizations and supports a specific
community that has communal concerns. It may be
managed by the organizations or a third party, and may
exist on premise or off premise.
3. Public cloud. The cloud infrastructure is made available
to the general public or a large industry group and is
owned by an organization selling cloud services.
4. Hybrid cloud. The cloud infrastructure is a composition
of two or more clouds (private, community, or public).
IJTSRD28037
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD28037 | Volume – 3 | Issue – 6 | September - October 2019 Page 90
2. CLOUD COMPUTING
Cloud computing is the on-demand delivery of compute
power, database, storage, applications, and other IT
resources via the internet with pay-as-you-go pricing.
Whether you are using it to run applications that share
photos to millions of mobile users or to support business
critical operations, a cloud services platform provides rapid
access to flexible and low cost IT resources. With cloud
computing, you don’t need to make large upfront
investments in hardware and spend a lot of time on the
heavy lifting of managing that hardware. Instead, you can
provision exactly the right type and size of computing
resources you need to power your newest idea or operate
your IT department. You can access as many resources as
you need, almost instantly, and only pay for what you use.
Cloud computing gives you access to servers, storage,
databases, and a broad set of application services over the
Internet. A cloud services provider such as Amazon Web
Services owns and maintains the network-connected
hardware required for these application services, while you
provision and use what you need via a web application.
3. CLOUD SOLUTION
These services are categorized into five prominent sections
as follows:
1. Infrastructure as a Service (IaaS): This provides a
platform virtualization environment as a service rather
than purchasing servers, software, data centers etc.
2. Software as a Service (SaaS): This service deploys
software over the Internet which is deployed to run
behind firewall in your LAN or PC.
3. Platform as a Service (PaaS): This kind of cloud
computing provide development environment as a
service. You can use the middleman’s (broker)
equipment to develop your own program and deliver it
to the user through the Internet and Servers.
4. Storage as a Service (StaaS): This is database like
services billed on utility computing services basis; e.g
gigabyte per month
5. Desktop as a Service (DaaS): This is the provisioning of
the desktop environment eitherwithina browserorasa
terminal server
4. CRYPTOGRAPHY
Cryptography is a method of protecting information and
communications through the use of codes so that only those
for whom the information is intended can read and process
it. The pre-fix "crypt" means "hidden" or "vault" and the
suffix "graphy" stands for "writing."
In computer science, cryptography refers to secure
information and communication techniques derived from
mathematical concepts and a set of rule-based calculations
called algorithms to transform messages in ways that are
hard to decipher. These deterministic algorithms are used
for cryptographic key generation and digital signing and
verification to protect data privacy, web browsing on the
internet and confidential communications such as credit
card transactions and email.
4.1. Cryptographic Techniques
Cryptography is closely related to the disciplines of
cryptology and cryptanalysis. It includes techniques such as
microdots, merging words with images, and other ways to
hide information in storage or transit. However, in today's
computer-centric world, cryptography is most often
associated with scrambling plaintext (ordinary text,
sometimes referred to as cleartext) into ciphertext (a
process called encryption), then back again (known as
decryption) as shown Figure 1. Individualswhopracticethis
field are known as cryptographers.
Cryptography systems can be broadly classified into
symmetric-key systems that use a single key that both the
sender and recipient have, and public-key systems that use
two keys, a public key known to everyone and a private key
that only the recipient of messages uses.
Modern cryptography concerns itself withthefollowingfour
objectives:
1. Confidentiality: the information cannot be understood
by anyone for whom it was unintended
2. Integrity: the information cannot be altered in storage
or transit between sender and intended receiver
without the alteration being detected
3. Non-repudiation: the creator/sender of theinformation
cannot deny at a later stage his or her intentions in the
creation or transmission of the information
4. Authentication: the sender and receiver can confirm
each other's identity and the origin/destination of the
information
Procedures and protocols that meet some or all of the above
criteria are known as cryptosystems. Cryptosystems are
often thought to refer only to mathematical procedures and
computer programs; however, they also include the
regulation of human behavior, such as choosing hard-to-
guess passwords, logging off unused systems, and not
discussing sensitive procedures with outsiders.
Figure1. Cryptography
4.2. Public Key Cryptography
Public key encryption, or public key cryptography, Figure 2, is a method of encrypting data withtwodifferentkeys andmaking
one of the keys, the public key, available for anyone to use. The other key is known as the private key. Data encrypted with the
public key can only be decrypted with the private key, and data encrypted with the private key can only be decrypted with the
public key. Public key encryption is also known as asymmetric encryption. It is widely used, especially for TLS/SSL, which
makes HTTPS possible.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD28037 | Volume – 3 | Issue – 6 | September - October 2019 Page 91
Figure2. Public Key Cryptography
5. RSA PUBLIC KEY CRYPTOGRAPHY
RSA (Rivest–Shamir–Adleman) is one of the first public-key
cryptosystems and is widely used for secure data
transmission. In such a cryptosystem, the encryption key is
public and it is different from the decryption key which is
kept secret (private). In RSA, this asymmetry is based on the
practical difficulty of the factorization of the product of two
large prime numbers, the "factoring problem". The acronym
RSA is made of the initial letters of the surnames of Ron
Rivest, Adi Shamir, and Leonard Adleman, who first publicly
described the algorithm in 1977. Clifford Cocks, an English
mathematician working for the British intelligence agency
Government Communications Headquarters (GCHQ), had
developed an equivalent system in 1973, but this was not
declassified until 1997.
A user of RSA creates and then publishes a public key based
on two large prime numbers, along with an auxiliary value.
The prime numbers must be kept secret. Anyone can usethe
public key to encrypt a message, but only someone with
knowledge of the prime numbers can decode the message.
Breaking RSA encryption is known as the RSA problem.
Whether it is as difficult as the factoring problemremains an
open question. There are currently no published methodsto
defeat the system if a large enough key is used.
RSA is a relatively slow algorithm, and because of this, it is
less commonly used to directly encrypt user data. More
often, RSA passes encrypted shared keys for symmetric key
cryptography which in turn can perform bulk encryption-
decryption operations at much higher speed.
RSA Key Generation Algorithm
Select two different prime numbers p and q for security
aim, the integer’s p and q must be large.
Calculate n=p*q n will be used as the module for public
key and private key.
Calculate f(n)=(q-1)(p-1),Wherefisa functionofEuler’s
Select an integer e such that 1<e<f(n) and GCD (e,
f(n))=1; e and f(n) are co-prime.
Determine d: d is multiplicative inverse of e mod (f(n))
(e * d) mod f(n) = 1 d is the private key.
Encryption:
M is plain text data.
C=me mod n
Decryption:
C is received cipher text.
M= Cd mod n
6. EXISTING SYSTEMS
There are several systems for dealing with two way mobile
authentication. They may differ in delivering the password
to the authorized user or a different entity based on the
security constraints. Some of them are as follows:
1. Token: A token is a device used to authorize the user
with the services. A token may be softwareorhardware.
Software tokens are used to identify the person
electronically, i.e. it may be used as a passwordtoaccess
something. Hardware tokens are small hand held
devices which carry the information which stores
cryptographic keys,digital signaturesorevenbio-metric
data by which we can send generated key number to a
client system. Mostly all the hardware tokens have a
display capability. The hardware tokens include a USB,
digital pass etc. Drawbacks A token shall be carried all
the time. Special software is required to read the token.
Anyone can access the informationthathasthetokeni.e.
in case of theft.
2. Biometric: A biometric authentication is the advanced
form of authentication. A biometric authentication is
nothing but it scans the user’s characteristics such as
finger print and eye retina and stores in the form of a
string. When the user tries to authenticate it matches
with the stored data and then gives access when a
commonality is achieved and when the user has gained
access he can enter the password to view the required
information. Drawbacks Biometric authentication is
convenient only for limited applications, since the
system becomes very slow for a large number of users.
Finger prints can be taken on a small tape and can be
provided for the hardware Additional hardware is
required to detect the fingerprints and eye retinas.
3. One Time Password: Dynamic password (namely, One-
Time-Password) technology is a sequence password
system and is the only password system proved non-
decrypted in theory. Its basic idea is to add uncertain
factor in authentication so that users need to provide
different messages for authentication each time. By this
way, the applications themselves can obtain higher
security guarantee than those use static password
technology. When login request from user is received,
server system generatesa one-timepasswordandsends
it through a SMS to a GSM cell phone registered for that
specified user. The one-time password has a default
timeout. In the second phase of the authentication, a
request is sent with the user id and a hash of the one-
time password. If both the onetime and user specified
password is valid then the user will be authenticated.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD28037 | Volume – 3 | Issue – 6 | September - October 2019 Page 92
7. PROPOSED SYSTEM
The Proposed system is based on the OPT existingsystem. In
the proposed, first user need to generate a key pairs, using
any public key cryptography algorithm (e.g. RSA algorithm).
In the proposed system user will request for login with ID
and PIN (static password). If it matches with data stored in
data based then server generate a random password (OTP)
and encrypt it with the stored user’s publickeyandsenditto
user. User will decrypt the encrypted one time password
(EOTP) and send it to sever and if it match with original one
time password (OTP) user is authenticated.RSAalgorithmis
used in the proposed system as public key cryptography
algorithm. In the proposed system third party such as GSM
mobile number or email id is not required. User will
generate a key pairs using RSA algorithm and stores public
key into the database during registration of users account.
Proposed system Figure 3 works as follows:
1. User will request for login with ID and PIN.
2. Server will verify ID and PIN and generate a OPT and
encrypt it with users public key which is stored in
database and send the encrypted OTP to user.
3. User will decrypt the encrypted OTP with private key
and send the result to server.
4. Server will match it with generated OTP; if it matches
then user is authenticated.
Figure3. Proposed System Flow
Advantages of proposed system over existing system are:
1. Proposed system is independent of third party (e.g.
email, GSM mobile number).
2. Proposed system is highly secure based on key size.
3. Proposed system is more efficient.
Although this proposed system is designed for cloud
authentication but also it can be usedinotherarea whichare
describe bellow:
1. All the social networking sites: The proposed system
will provide more secure authentication system
compared to existing systems usedbysocial networking
sites.
2. All the electronic-commerce sites: The proposedsystem
will provide more secure authentication system
compared to existing systems used by electronic-
commerce sites.
3. In the e-banking sectors also proposed system is very
useful.
8. CONCLUSIONS
In this paper we used RSA public key cryptography for
encrypting and decrypting One Time Password(OPT).Inthe
proposed system encrypted OPT is directly send to user
through the network. In the proposed system third party
such as GSM mobile number or email is not required. The
proposed system is designed to improve security, efficiency
and to remove dependency on third party. Proposed system
is highly secure and is dependent on the key size. The key
pairs are generated with the help of publickeycryptography
algorithm.
9. REFERENCES
[1] H: B Kekre, V. A Bharadi, International Journal of
Intelligent Information Technology Application, 2009,
2(6):279-285.
[2] Gururaj Ramachandra, Farrouka Aslam Khan, "A
Comprehensive Survey on Security in Cloud
Computing", The 3rd International WorkshoponCyber
Security andDigital Investigation(CSDI2017)Procedia
Computer Science 110 (2017) 465–472.
[3] S. Lee, I. Ong, H. T. Lim, H. J. Lee, Two factor
authentication for cloud computing, International
Journal of KIMICS, vol 8, Pp. 427-432.-33
[4] M. S. Hwang, and L. H. Li, ”A New Remote User Authen-
tication Scheme using Smart Cards”,IEEETransactions
on Consumer Electronics 46 (1) (2000) 28-30.
[5] Mell P. and Grance T., “The NIST Definition of Cloud
Computing”, vol 53, issue 6, 2009.
[6] William Stallings, “CryptographyandNetwork Security
Principles and Practices”, Prentice Hall, New Delhi.
[7] https://aws.amazon.com/what-is-cloud-computing/
[8] https://searchsecurity.techtarget.com/definition/cryp
tography
[9] https://www.cloudflare.com/learning/ssl/how-does-
public-key-encryption-work/

More Related Content

What's hot

Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...eSAT Publishing House
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computingJahangeer Qadiree
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingeSAT Journals
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computingijtsrd
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...csandit
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloudeSAT Publishing House
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyIRJET Journal
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
 
Smart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoTSmart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoTAngelo Corsaro
 

What's hot (18)

Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
 
176
176176
176
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
 
C017421624
C017421624C017421624
C017421624
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
 
Challenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computingChallenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computing
 
489 493
489 493489 493
489 493
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
Smart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoTSmart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoT
 

Similar to Secure One Time Password OTP Generation for user Authentication in Cloud Environment

SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGIRJET Journal
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud ComputingIJSRED
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 

Similar to Secure One Time Password OTP Generation for user Authentication in Cloud Environment (20)

SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
 
Ijetcas14 424
Ijetcas14 424Ijetcas14 424
Ijetcas14 424
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
G0314043
G0314043G0314043
G0314043
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 

Recently uploaded (20)

Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 

Secure One Time Password OTP Generation for user Authentication in Cloud Environment

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 3 Issue 6, October 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD28037 | Volume – 3 | Issue – 6 | September - October 2019 Page 89 Secure One Time Password (OTP) Generation for user Authentication in Cloud Environment Kyaw Swar Hlaing1, Nay Aung Aung2 1Assistant Lecturer, Faculty of Computer System and Technology, 1Myanmar Institute of Information Technology, Mandalay, Myanmar 2Lecturer, Information Technology Support and Maintenance Department, 2University of Computer Studies, Mandalay, Myanmar ABSTRACT Cloud computing is one of today’s most exciting technologies due to its ability to reduce cost associated with computing. This technology worldwide usedto improve the business infrastructure and performance. The major threat that the cloud is facing now is security. So, the user authentication is very important step in cloud environment. The traditional authentication (user name and static password or PIN code) can be easily broken by the skillful attacker. An Unauthorized user can easilyenterintothesystemifheknowsthe user credentials. Encryption algorithms play a main role in information security systems. Efficient password generation for user authentication is an important problem in secure Cloud communications. In the paper, the One Time Password (OTP) approach is used to authenticate the cloud users. The generated OPT is encrypted by RSA public key encryption to be more secure for the cloud user authentication. So the third partyisnot requiredtogenerate OPT in the proposed paper. This paper can help to solve the user authentication problem in Cloud environment. KEYWORDS: Cloud computing, user authentication, password generation, OTP, RSA How to cite this paper: KyawSwarHlaing | Nay Aung Aung "Secure One Time Password (OTP) Generation for user Authentication in Cloud Environment" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-6, October 2019, pp.89-92, URL: https://www.ijtsrd.com/papers/ijtsrd28 037.pdf Copyright © 2019 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) 1. INTRODUCTION Cloud computing is the communal term for a group of IT technologies which in teamwork are changingthelandscape of how IT services are provided, accessed and paidfor.Some of the supporting technologies have already been available for quite some time, but it is the combination of several technologies which enables a whole new way of using IT. Cloud computing is a model for enabling convenient, on- demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. The concept of Cloud Computing revolves around distributed architecture that centralizes server resources on a scalable platform so as to provide on demand computing resources and services. Cloud platforms are offered by the Cloud service providers (CSP’s) for their customers to use and create their web services, much like internet service providers offer costumers high speed broadband to access the internet. CSPs and ISPs (Internet Service Providers) both offer services. Cloud providersoffer three types of services i.e. 1. Software as a Service (SaaS), 2. Platform as a Service (PaaS) 3. Infrastructure as a Service (IaaS) In addition, organizations can easily meet the needs of rapidly changing markets to ensure that they are always on the leading edge for their consumers. The clients of commercial cloudsrentcomputing power(virtual machines) or storage space (virtual space) dynamically, according to the needs of their business. With the exploit of this technology, users can access heavy applications via lightweight portable devices such as mobilephones,PCsand PDAs. There are also fourdifferentclouddeploymentmodels namely. 1. Private cloud. The cloud infrastructure is operated for a private organization. It may be managed by the organization or a third party, and may exist on premise or off premise. 2. Community cloud. The cloud infrastructure is sharedby several organizations and supports a specific community that has communal concerns. It may be managed by the organizations or a third party, and may exist on premise or off premise. 3. Public cloud. The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. 4. Hybrid cloud. The cloud infrastructure is a composition of two or more clouds (private, community, or public). IJTSRD28037
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD28037 | Volume – 3 | Issue – 6 | September - October 2019 Page 90 2. CLOUD COMPUTING Cloud computing is the on-demand delivery of compute power, database, storage, applications, and other IT resources via the internet with pay-as-you-go pricing. Whether you are using it to run applications that share photos to millions of mobile users or to support business critical operations, a cloud services platform provides rapid access to flexible and low cost IT resources. With cloud computing, you don’t need to make large upfront investments in hardware and spend a lot of time on the heavy lifting of managing that hardware. Instead, you can provision exactly the right type and size of computing resources you need to power your newest idea or operate your IT department. You can access as many resources as you need, almost instantly, and only pay for what you use. Cloud computing gives you access to servers, storage, databases, and a broad set of application services over the Internet. A cloud services provider such as Amazon Web Services owns and maintains the network-connected hardware required for these application services, while you provision and use what you need via a web application. 3. CLOUD SOLUTION These services are categorized into five prominent sections as follows: 1. Infrastructure as a Service (IaaS): This provides a platform virtualization environment as a service rather than purchasing servers, software, data centers etc. 2. Software as a Service (SaaS): This service deploys software over the Internet which is deployed to run behind firewall in your LAN or PC. 3. Platform as a Service (PaaS): This kind of cloud computing provide development environment as a service. You can use the middleman’s (broker) equipment to develop your own program and deliver it to the user through the Internet and Servers. 4. Storage as a Service (StaaS): This is database like services billed on utility computing services basis; e.g gigabyte per month 5. Desktop as a Service (DaaS): This is the provisioning of the desktop environment eitherwithina browserorasa terminal server 4. CRYPTOGRAPHY Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. The pre-fix "crypt" means "hidden" or "vault" and the suffix "graphy" stands for "writing." In computer science, cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms to transform messages in ways that are hard to decipher. These deterministic algorithms are used for cryptographic key generation and digital signing and verification to protect data privacy, web browsing on the internet and confidential communications such as credit card transactions and email. 4.1. Cryptographic Techniques Cryptography is closely related to the disciplines of cryptology and cryptanalysis. It includes techniques such as microdots, merging words with images, and other ways to hide information in storage or transit. However, in today's computer-centric world, cryptography is most often associated with scrambling plaintext (ordinary text, sometimes referred to as cleartext) into ciphertext (a process called encryption), then back again (known as decryption) as shown Figure 1. Individualswhopracticethis field are known as cryptographers. Cryptography systems can be broadly classified into symmetric-key systems that use a single key that both the sender and recipient have, and public-key systems that use two keys, a public key known to everyone and a private key that only the recipient of messages uses. Modern cryptography concerns itself withthefollowingfour objectives: 1. Confidentiality: the information cannot be understood by anyone for whom it was unintended 2. Integrity: the information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected 3. Non-repudiation: the creator/sender of theinformation cannot deny at a later stage his or her intentions in the creation or transmission of the information 4. Authentication: the sender and receiver can confirm each other's identity and the origin/destination of the information Procedures and protocols that meet some or all of the above criteria are known as cryptosystems. Cryptosystems are often thought to refer only to mathematical procedures and computer programs; however, they also include the regulation of human behavior, such as choosing hard-to- guess passwords, logging off unused systems, and not discussing sensitive procedures with outsiders. Figure1. Cryptography 4.2. Public Key Cryptography Public key encryption, or public key cryptography, Figure 2, is a method of encrypting data withtwodifferentkeys andmaking one of the keys, the public key, available for anyone to use. The other key is known as the private key. Data encrypted with the public key can only be decrypted with the private key, and data encrypted with the private key can only be decrypted with the public key. Public key encryption is also known as asymmetric encryption. It is widely used, especially for TLS/SSL, which makes HTTPS possible.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD28037 | Volume – 3 | Issue – 6 | September - October 2019 Page 91 Figure2. Public Key Cryptography 5. RSA PUBLIC KEY CRYPTOGRAPHY RSA (Rivest–Shamir–Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and it is different from the decryption key which is kept secret (private). In RSA, this asymmetry is based on the practical difficulty of the factorization of the product of two large prime numbers, the "factoring problem". The acronym RSA is made of the initial letters of the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman, who first publicly described the algorithm in 1977. Clifford Cocks, an English mathematician working for the British intelligence agency Government Communications Headquarters (GCHQ), had developed an equivalent system in 1973, but this was not declassified until 1997. A user of RSA creates and then publishes a public key based on two large prime numbers, along with an auxiliary value. The prime numbers must be kept secret. Anyone can usethe public key to encrypt a message, but only someone with knowledge of the prime numbers can decode the message. Breaking RSA encryption is known as the RSA problem. Whether it is as difficult as the factoring problemremains an open question. There are currently no published methodsto defeat the system if a large enough key is used. RSA is a relatively slow algorithm, and because of this, it is less commonly used to directly encrypt user data. More often, RSA passes encrypted shared keys for symmetric key cryptography which in turn can perform bulk encryption- decryption operations at much higher speed. RSA Key Generation Algorithm Select two different prime numbers p and q for security aim, the integer’s p and q must be large. Calculate n=p*q n will be used as the module for public key and private key. Calculate f(n)=(q-1)(p-1),Wherefisa functionofEuler’s Select an integer e such that 1<e<f(n) and GCD (e, f(n))=1; e and f(n) are co-prime. Determine d: d is multiplicative inverse of e mod (f(n)) (e * d) mod f(n) = 1 d is the private key. Encryption: M is plain text data. C=me mod n Decryption: C is received cipher text. M= Cd mod n 6. EXISTING SYSTEMS There are several systems for dealing with two way mobile authentication. They may differ in delivering the password to the authorized user or a different entity based on the security constraints. Some of them are as follows: 1. Token: A token is a device used to authorize the user with the services. A token may be softwareorhardware. Software tokens are used to identify the person electronically, i.e. it may be used as a passwordtoaccess something. Hardware tokens are small hand held devices which carry the information which stores cryptographic keys,digital signaturesorevenbio-metric data by which we can send generated key number to a client system. Mostly all the hardware tokens have a display capability. The hardware tokens include a USB, digital pass etc. Drawbacks A token shall be carried all the time. Special software is required to read the token. Anyone can access the informationthathasthetokeni.e. in case of theft. 2. Biometric: A biometric authentication is the advanced form of authentication. A biometric authentication is nothing but it scans the user’s characteristics such as finger print and eye retina and stores in the form of a string. When the user tries to authenticate it matches with the stored data and then gives access when a commonality is achieved and when the user has gained access he can enter the password to view the required information. Drawbacks Biometric authentication is convenient only for limited applications, since the system becomes very slow for a large number of users. Finger prints can be taken on a small tape and can be provided for the hardware Additional hardware is required to detect the fingerprints and eye retinas. 3. One Time Password: Dynamic password (namely, One- Time-Password) technology is a sequence password system and is the only password system proved non- decrypted in theory. Its basic idea is to add uncertain factor in authentication so that users need to provide different messages for authentication each time. By this way, the applications themselves can obtain higher security guarantee than those use static password technology. When login request from user is received, server system generatesa one-timepasswordandsends it through a SMS to a GSM cell phone registered for that specified user. The one-time password has a default timeout. In the second phase of the authentication, a request is sent with the user id and a hash of the one- time password. If both the onetime and user specified password is valid then the user will be authenticated.
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD28037 | Volume – 3 | Issue – 6 | September - October 2019 Page 92 7. PROPOSED SYSTEM The Proposed system is based on the OPT existingsystem. In the proposed, first user need to generate a key pairs, using any public key cryptography algorithm (e.g. RSA algorithm). In the proposed system user will request for login with ID and PIN (static password). If it matches with data stored in data based then server generate a random password (OTP) and encrypt it with the stored user’s publickeyandsenditto user. User will decrypt the encrypted one time password (EOTP) and send it to sever and if it match with original one time password (OTP) user is authenticated.RSAalgorithmis used in the proposed system as public key cryptography algorithm. In the proposed system third party such as GSM mobile number or email id is not required. User will generate a key pairs using RSA algorithm and stores public key into the database during registration of users account. Proposed system Figure 3 works as follows: 1. User will request for login with ID and PIN. 2. Server will verify ID and PIN and generate a OPT and encrypt it with users public key which is stored in database and send the encrypted OTP to user. 3. User will decrypt the encrypted OTP with private key and send the result to server. 4. Server will match it with generated OTP; if it matches then user is authenticated. Figure3. Proposed System Flow Advantages of proposed system over existing system are: 1. Proposed system is independent of third party (e.g. email, GSM mobile number). 2. Proposed system is highly secure based on key size. 3. Proposed system is more efficient. Although this proposed system is designed for cloud authentication but also it can be usedinotherarea whichare describe bellow: 1. All the social networking sites: The proposed system will provide more secure authentication system compared to existing systems usedbysocial networking sites. 2. All the electronic-commerce sites: The proposedsystem will provide more secure authentication system compared to existing systems used by electronic- commerce sites. 3. In the e-banking sectors also proposed system is very useful. 8. CONCLUSIONS In this paper we used RSA public key cryptography for encrypting and decrypting One Time Password(OPT).Inthe proposed system encrypted OPT is directly send to user through the network. In the proposed system third party such as GSM mobile number or email is not required. The proposed system is designed to improve security, efficiency and to remove dependency on third party. Proposed system is highly secure and is dependent on the key size. The key pairs are generated with the help of publickeycryptography algorithm. 9. REFERENCES [1] H: B Kekre, V. A Bharadi, International Journal of Intelligent Information Technology Application, 2009, 2(6):279-285. [2] Gururaj Ramachandra, Farrouka Aslam Khan, "A Comprehensive Survey on Security in Cloud Computing", The 3rd International WorkshoponCyber Security andDigital Investigation(CSDI2017)Procedia Computer Science 110 (2017) 465–472. [3] S. Lee, I. Ong, H. T. Lim, H. J. Lee, Two factor authentication for cloud computing, International Journal of KIMICS, vol 8, Pp. 427-432.-33 [4] M. S. Hwang, and L. H. Li, ”A New Remote User Authen- tication Scheme using Smart Cards”,IEEETransactions on Consumer Electronics 46 (1) (2000) 28-30. [5] Mell P. and Grance T., “The NIST Definition of Cloud Computing”, vol 53, issue 6, 2009. [6] William Stallings, “CryptographyandNetwork Security Principles and Practices”, Prentice Hall, New Delhi. [7] https://aws.amazon.com/what-is-cloud-computing/ [8] https://searchsecurity.techtarget.com/definition/cryp tography [9] https://www.cloudflare.com/learning/ssl/how-does- public-key-encryption-work/