SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1348
MULTI-FACTOR AUTHENTICATION SECURITY
FRAMEWORK USING BlOCKCHAIN IN CLOUD COMPUTING
Aparna Thakare1, Rinkal Gohil2, Sakshi Gaikwad3 , Puja Dhavle4
1Professor, Department of Computer Engineering, SCOE, Pune, India
2,3,4 Student, Department of Computer Engineering, SCOE, Pune, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Authorizing access to the public cloudhasevolved
over the last few years, from simple user authentication and
password authenticationtotwo-factorauthentication(TOTP),
with the addition of an additional field for entering a unique
code. Today it is used by almost all major websites such as
Facebook, Microsoft, Apple and is a frequently used solution
for banking websites. On the other side, the private cloud
solutions like OpenStack, CloudStack or Eucalyptus doesn’t
offer this security improvement. This article is presenting the
advantages of this new type of authentication and synthetizes
the TOTP authentication forms used by majorcloudproviders.
For this purpose, the web authentication form has been
modified and a new authentication module has been
developed. The present document covers as well the entire
process of adding a TOTP user, generating and sending the
secret code in QR form to the user. Also add the Blockchain
technology for uploadingdatainproposed modelwhichsecure
our uploaded data on cloud.
Key Words: Cloud Computing, Multi-Factor
authentication, OTP.
1. INTRODUCTION
We present Secured Access Control Using Multifactor
Authentication for Cloud Computing Services to achieving
security in distributedcloudstorage.It becomesincreasingly
susceptible to use cloud services to share data in a friend
circle in the cloud computing environment. Since it is not
feasible to implement full lifecycle privacy security, access
control becomes a challenging task, especially when we
share sensitive data on cloud servers. This project is
presenting the advantages of this new typeofauthentication
and synthetizes the TOTP authentication forms used by
major cloud providers. For this purpose, the web
authentication form has been modified and a new
authentication module has been developed With the help of
our system we can achieve maximum security of data in
distributed cloud. Cloud computing its a software platform
used to control large pools of compute, storage, and
networking resources of one or more datacenters. By using
this environment, users can benefit of shared computing
resources from anywhere, at any time using an Internet
connection. Their personal data that a couple of years ago
used to be stored on personal hard drives, DVDs or CDs is
now stored on cloud. Nowadays many companies are
offering cloud data storage services such as Google Cloud
Storage, AWS S3 and Microsoft Azure Storage, etc. The
company that offers cloud services is usually called Cloud
Service Provider (CSP). The high demand of computing
resources has pushed organizations to outsource their
storages and computing needs. Cloud computing can help
organizations on accomplishing more by separating the
physical bound between IT infrastructure and its users.
Nevertheless, both normal users and companies cannot
afford to put their sensitive information in a platform that
they cannot control without being assured that their data is
safe and secure. In order to have a securecloudenvironment
each of its components must be secured. Any cloud
computing client must authenticate before being able to use
cloud resources. The authentication component is a muston
any type of cloud therefore there is no coincidencethatmost
of the attacks are performed at this level.
1.1 Motivation
In the existing system no more security for storing data on
cloud so we propose a Secured Access Control Using
MultiFactor Authentication and Blockchain technology for
Cloud Computing Services to achieving security in
distributed cloud storage. The mechanism can enhance the
security of the system, especially in those scenarios where
many users share the same computer for web-based cloud
services.
1.2 Goals And Objective
 To Improve The security.
 Secure our cloud data.
 Securely share online data.
1.3. Scope
Methodology achieving securityindistributedcloudstorage.
In particular, in our proposed access control framework, a
property based access control system is executed with the
need of blockchain technology. As a client can’t access the
data on the off chance that they don’t hold OTP. With the
help of our system we can achieve maximumsecurityofdata
in distributed cloud.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1349
2. LITERATURE REVIEW
 Security Assessment of OpenStack cloud using
outside and inside software tools
Authors: Ionel Gordin, Adrian Graur, Alin Potorac, Doru
Balan.
Description:
In this Paper, the security assessments performed,analyzed
the OpenStack cloud Pike version from both outside and
inside the cloud network environment. Tests were
performed using 3 vulnerability scanners: Nessus,
Metasploit and OpenVAS. An outside scan has been
performed as well using web app Tenable .IO. we can
conclude that Metasploit provided the most results.
Although, Metasploit could be considered from this
perspective the absolute winner, Nessus provided the most
details about each opened port found and offered
suggestions on how to mitigate the problemfound.OpenVAS
is a free of charge application despite NessusandMetasploit,
the results were surprisingly well organized and detailed.
To secure the OpenStack services, first shouldbeconsidered
what ports must be accessible from Internet and what ports
to be opened from inside the cloud. At the end of this
incursion we will have one list of openedportsforinside and
another list for outside ports. Some ports should be
accessible only to some inside or outside hosts. When the
entire list of ports and their limitations is completed then it
can be applied the necessaryfirewall rules.OpenStack comes
with an embedded firewall that can be configured easily
through dashboard web interface. Future work will analyze
further the security of cloud containers and will provide a
more detailed approach about isolating VMs from their
neighbors and as well from outside threats.
 Survey on Usable and Secure Two-Factor
Authentication
Authors: Archana B.S.,Ashika Chandrashekar, Anusha
Govind Bangi,B.M. Sanjana,Syed Akram,
Description:
In todays Internet environment, each ones identity and
secret information are easily copied and forged. Hence its
necessary to validate the user by means of password
basedauthentication. Single factor based passwords are not
considered secure anymore on the Internet and in the
banking world. Passwords that are easily guessed are easily
intercepted by password cracking tools. Two Factor
authentication provide an additional layer of security
assurance by utilizing two different factors. Several
protocols have been put forthtomakeauthenticationsecure.
Das.et.al scheme introduced remote user authentication
which is uses a Dynamic ID where the stolen verifier attack
cannot take place because there is no verifier table.This was
followed by Misbah.et.al scheme which involved the use of
timeserver and achieved mutual authentication. Syed.et.al
scheme is an extension of Misbah.et.al scheme where the
random number is generated by taking the time stamp on
the client machine as the seed value and thereby avoids the
need to synchronize the timeservers. These schemes are
secure against various attacks.
 An Enhanced SMS-based OTP Scheme
Authors: Yonghe Zhou, Liang Hu, Jianfeng Chu
Description:
In this paper, we proposed a scheme to enhance the security
of SMS-based OTP. In this scheme, we take SMS as transport
layer. Message are encrypted inthislayer.Otherapplications
can get the message of transport layer but they cant decrypt
it. The decrypt work proceeded in application layer This
scheme can prevent outside threats like MITM attack and
replay attack. It also can prevent threats from applications
on smartphone like eavesdropping and forgeryattack.Inthe
course of this work, we realize thattheusermightchange his
smartphone, the counter stored in smartphone might get
lost. In our future work, TOTP will be introducedtocalculate
the request code. Thus, the counter will be replaced by a
time parameter which do not need to store on smartphone.
 OTP-BasedTwo-FactorAuthentication UsingMobile
Phones
Authors: Mohamed Hamdy Eldefrawy, Khaled Alghathbar,
Muhammad Khurram Khan,
Description:A new two-factor OTP-based authentication
scheme has been proposed using mobile phones as they are
becoming more and more powerful devices. This new
algorithm provides forward and infinite OTP generation
using two nested hash functions. We have illustrated our
approach to an online authentication process. This scheme
achieves better characteristics than the other schemes
discussed above. Our proposal is not limited to a certain
number of authentications, unlikethepreviously-mentioned
OTP hashing-based schemes, and does not involve
computationally expensive techniques to provide the
infiniteness like. Our algorithm doesnt require a token
embedded server synchronized clock like. Our approach
eliminates the problems with utilizing OTPs with an SMS,
consisting of the SMS costanddelay, alongwithinternational
roaming restrictions like. A detailed security analysis was
also performed that covered many of the common types of
attacks. The two factor authentication property has been
achieved without restrictions.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1350
3. ADVANCED SYSTEM
Fig -1: Advanced System Architecture
In this system we there are three modules:
1. Data Owner.
2. User
3. Authority
3. CONCLUSION
We developed a web application under cloud computingfor
uploading and store document on cloud with the help of
mutifactor authentication and blockchain technology. In
multifactor authentication system we use OTP, Unique code
for login and we use Blockchian technology for seurelystore
our document on cloud.
REFERENCES
[1] Ionel Gordin, Adrian Graur, Alin Potorac, Doru
Balan,”Security Assessment of OpenStack cloud using
outside and inside software tools”,14th International
Conference on DEVELOPMENT AND APPLICATION
SYSTEMS, Suceava, Romania, May 24-26, 2018.
[2] Archana B.S.,Ashika Chandrashekar, Anusha Govind
Bangi,B.M. Sanjana,Syed Akram,”Survey on Usable and
Secure Two-Factor Authentication”,2017 2 nd IEEE
International Conference On Recent Trends in Electronics
Information Communication Technology (RTEICT),May19-
20, 2017, India.
[3] Yonghe Zhou, Liang Hu, Jianfeng Chu,”An EnhancedSMS-
based OTP Scheme”,2nd International Conference on
Automation, Mechanical Control and Computational
Engineering (AMCCE 2017).
[4] M. Kimura and K. Saito, “Tractable models for
information diffusion in social networks,”inPKDD,2006, pp.
259–271.
[5] Mohamed Hamdy Eldefrawy, Khaled Alghathbar,
Muhammad Khurram Khan,”OTPBased Two-Factor
Authentication Using Mobile Phones”,2011 Eighth
International Conference on Information Technology: New
Generations.
In this Data owner is the owner of file uploaded on cloud.
Data owner can upload file seurely using blockchain
technology in our web application. User can view and
download all file uploaded by data owner. Authority have
access and view all data owner and user registered on our
application. In our application there is only one authority
user is present and number of data owner and user can
registered.

More Related Content

Similar to MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMPUTING

Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
eSAT Journals
 

Similar to MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMPUTING (20)

IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
 
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key Presentation
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
 
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud Environment
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
 
IRJET - Cloud based Datacenter in Virtual Private Network
IRJET - Cloud based Datacenter in Virtual Private NetworkIRJET - Cloud based Datacenter in Virtual Private Network
IRJET - Cloud based Datacenter in Virtual Private Network
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
Application Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeApplication Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart Home
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
 
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
 
Enabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure ResistanceEnabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure Resistance
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 

MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMPUTING

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1348 MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMPUTING Aparna Thakare1, Rinkal Gohil2, Sakshi Gaikwad3 , Puja Dhavle4 1Professor, Department of Computer Engineering, SCOE, Pune, India 2,3,4 Student, Department of Computer Engineering, SCOE, Pune, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Authorizing access to the public cloudhasevolved over the last few years, from simple user authentication and password authenticationtotwo-factorauthentication(TOTP), with the addition of an additional field for entering a unique code. Today it is used by almost all major websites such as Facebook, Microsoft, Apple and is a frequently used solution for banking websites. On the other side, the private cloud solutions like OpenStack, CloudStack or Eucalyptus doesn’t offer this security improvement. This article is presenting the advantages of this new type of authentication and synthetizes the TOTP authentication forms used by majorcloudproviders. For this purpose, the web authentication form has been modified and a new authentication module has been developed. The present document covers as well the entire process of adding a TOTP user, generating and sending the secret code in QR form to the user. Also add the Blockchain technology for uploadingdatainproposed modelwhichsecure our uploaded data on cloud. Key Words: Cloud Computing, Multi-Factor authentication, OTP. 1. INTRODUCTION We present Secured Access Control Using Multifactor Authentication for Cloud Computing Services to achieving security in distributedcloudstorage.It becomesincreasingly susceptible to use cloud services to share data in a friend circle in the cloud computing environment. Since it is not feasible to implement full lifecycle privacy security, access control becomes a challenging task, especially when we share sensitive data on cloud servers. This project is presenting the advantages of this new typeofauthentication and synthetizes the TOTP authentication forms used by major cloud providers. For this purpose, the web authentication form has been modified and a new authentication module has been developed With the help of our system we can achieve maximum security of data in distributed cloud. Cloud computing its a software platform used to control large pools of compute, storage, and networking resources of one or more datacenters. By using this environment, users can benefit of shared computing resources from anywhere, at any time using an Internet connection. Their personal data that a couple of years ago used to be stored on personal hard drives, DVDs or CDs is now stored on cloud. Nowadays many companies are offering cloud data storage services such as Google Cloud Storage, AWS S3 and Microsoft Azure Storage, etc. The company that offers cloud services is usually called Cloud Service Provider (CSP). The high demand of computing resources has pushed organizations to outsource their storages and computing needs. Cloud computing can help organizations on accomplishing more by separating the physical bound between IT infrastructure and its users. Nevertheless, both normal users and companies cannot afford to put their sensitive information in a platform that they cannot control without being assured that their data is safe and secure. In order to have a securecloudenvironment each of its components must be secured. Any cloud computing client must authenticate before being able to use cloud resources. The authentication component is a muston any type of cloud therefore there is no coincidencethatmost of the attacks are performed at this level. 1.1 Motivation In the existing system no more security for storing data on cloud so we propose a Secured Access Control Using MultiFactor Authentication and Blockchain technology for Cloud Computing Services to achieving security in distributed cloud storage. The mechanism can enhance the security of the system, especially in those scenarios where many users share the same computer for web-based cloud services. 1.2 Goals And Objective  To Improve The security.  Secure our cloud data.  Securely share online data. 1.3. Scope Methodology achieving securityindistributedcloudstorage. In particular, in our proposed access control framework, a property based access control system is executed with the need of blockchain technology. As a client can’t access the data on the off chance that they don’t hold OTP. With the help of our system we can achieve maximumsecurityofdata in distributed cloud.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1349 2. LITERATURE REVIEW  Security Assessment of OpenStack cloud using outside and inside software tools Authors: Ionel Gordin, Adrian Graur, Alin Potorac, Doru Balan. Description: In this Paper, the security assessments performed,analyzed the OpenStack cloud Pike version from both outside and inside the cloud network environment. Tests were performed using 3 vulnerability scanners: Nessus, Metasploit and OpenVAS. An outside scan has been performed as well using web app Tenable .IO. we can conclude that Metasploit provided the most results. Although, Metasploit could be considered from this perspective the absolute winner, Nessus provided the most details about each opened port found and offered suggestions on how to mitigate the problemfound.OpenVAS is a free of charge application despite NessusandMetasploit, the results were surprisingly well organized and detailed. To secure the OpenStack services, first shouldbeconsidered what ports must be accessible from Internet and what ports to be opened from inside the cloud. At the end of this incursion we will have one list of openedportsforinside and another list for outside ports. Some ports should be accessible only to some inside or outside hosts. When the entire list of ports and their limitations is completed then it can be applied the necessaryfirewall rules.OpenStack comes with an embedded firewall that can be configured easily through dashboard web interface. Future work will analyze further the security of cloud containers and will provide a more detailed approach about isolating VMs from their neighbors and as well from outside threats.  Survey on Usable and Secure Two-Factor Authentication Authors: Archana B.S.,Ashika Chandrashekar, Anusha Govind Bangi,B.M. Sanjana,Syed Akram, Description: In todays Internet environment, each ones identity and secret information are easily copied and forged. Hence its necessary to validate the user by means of password basedauthentication. Single factor based passwords are not considered secure anymore on the Internet and in the banking world. Passwords that are easily guessed are easily intercepted by password cracking tools. Two Factor authentication provide an additional layer of security assurance by utilizing two different factors. Several protocols have been put forthtomakeauthenticationsecure. Das.et.al scheme introduced remote user authentication which is uses a Dynamic ID where the stolen verifier attack cannot take place because there is no verifier table.This was followed by Misbah.et.al scheme which involved the use of timeserver and achieved mutual authentication. Syed.et.al scheme is an extension of Misbah.et.al scheme where the random number is generated by taking the time stamp on the client machine as the seed value and thereby avoids the need to synchronize the timeservers. These schemes are secure against various attacks.  An Enhanced SMS-based OTP Scheme Authors: Yonghe Zhou, Liang Hu, Jianfeng Chu Description: In this paper, we proposed a scheme to enhance the security of SMS-based OTP. In this scheme, we take SMS as transport layer. Message are encrypted inthislayer.Otherapplications can get the message of transport layer but they cant decrypt it. The decrypt work proceeded in application layer This scheme can prevent outside threats like MITM attack and replay attack. It also can prevent threats from applications on smartphone like eavesdropping and forgeryattack.Inthe course of this work, we realize thattheusermightchange his smartphone, the counter stored in smartphone might get lost. In our future work, TOTP will be introducedtocalculate the request code. Thus, the counter will be replaced by a time parameter which do not need to store on smartphone.  OTP-BasedTwo-FactorAuthentication UsingMobile Phones Authors: Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan, Description:A new two-factor OTP-based authentication scheme has been proposed using mobile phones as they are becoming more and more powerful devices. This new algorithm provides forward and infinite OTP generation using two nested hash functions. We have illustrated our approach to an online authentication process. This scheme achieves better characteristics than the other schemes discussed above. Our proposal is not limited to a certain number of authentications, unlikethepreviously-mentioned OTP hashing-based schemes, and does not involve computationally expensive techniques to provide the infiniteness like. Our algorithm doesnt require a token embedded server synchronized clock like. Our approach eliminates the problems with utilizing OTPs with an SMS, consisting of the SMS costanddelay, alongwithinternational roaming restrictions like. A detailed security analysis was also performed that covered many of the common types of attacks. The two factor authentication property has been achieved without restrictions.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1350 3. ADVANCED SYSTEM Fig -1: Advanced System Architecture In this system we there are three modules: 1. Data Owner. 2. User 3. Authority 3. CONCLUSION We developed a web application under cloud computingfor uploading and store document on cloud with the help of mutifactor authentication and blockchain technology. In multifactor authentication system we use OTP, Unique code for login and we use Blockchian technology for seurelystore our document on cloud. REFERENCES [1] Ionel Gordin, Adrian Graur, Alin Potorac, Doru Balan,”Security Assessment of OpenStack cloud using outside and inside software tools”,14th International Conference on DEVELOPMENT AND APPLICATION SYSTEMS, Suceava, Romania, May 24-26, 2018. [2] Archana B.S.,Ashika Chandrashekar, Anusha Govind Bangi,B.M. Sanjana,Syed Akram,”Survey on Usable and Secure Two-Factor Authentication”,2017 2 nd IEEE International Conference On Recent Trends in Electronics Information Communication Technology (RTEICT),May19- 20, 2017, India. [3] Yonghe Zhou, Liang Hu, Jianfeng Chu,”An EnhancedSMS- based OTP Scheme”,2nd International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2017). [4] M. Kimura and K. Saito, “Tractable models for information diffusion in social networks,”inPKDD,2006, pp. 259–271. [5] Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan,”OTPBased Two-Factor Authentication Using Mobile Phones”,2011 Eighth International Conference on Information Technology: New Generations. In this Data owner is the owner of file uploaded on cloud. Data owner can upload file seurely using blockchain technology in our web application. User can view and download all file uploaded by data owner. Authority have access and view all data owner and user registered on our application. In our application there is only one authority user is present and number of data owner and user can registered.