Full Paper View Go Back
An Improved Authentication Technique with OTP in Cloud Computing
Vishal Paranjape1 , Vimmi Pandey2
Section:Research Paper, Product Type: Isroset-Journal
Vol.1 ,
Issue.3 , pp.22-26, May-2013
Online published on Jul 07, 2013
Copyright © Vishal Paranjape , Vimmi Pandey . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Vishal Paranjape , Vimmi Pandey, “An Improved Authentication Technique with OTP in Cloud Computing,” International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.3, pp.22-26, 2013.
MLA Style Citation: Vishal Paranjape , Vimmi Pandey "An Improved Authentication Technique with OTP in Cloud Computing." International Journal of Scientific Research in Computer Science and Engineering 1.3 (2013): 22-26.
APA Style Citation: Vishal Paranjape , Vimmi Pandey, (2013). An Improved Authentication Technique with OTP in Cloud Computing. International Journal of Scientific Research in Computer Science and Engineering, 1(3), 22-26.
BibTex Style Citation:
@article{Paranjape_2013,
author = {Vishal Paranjape , Vimmi Pandey},
title = {An Improved Authentication Technique with OTP in Cloud Computing},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {5 2013},
volume = {1},
Issue = {3},
month = {5},
year = {2013},
issn = {2347-2693},
pages = {22-26},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=54},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=54
TI - An Improved Authentication Technique with OTP in Cloud Computing
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Vishal Paranjape , Vimmi Pandey
PY - 2013
DA - 2013/07/07
PB - IJCSE, Indore, INDIA
SP - 22-26
IS - 3
VL - 1
SN - 2347-2693
ER -
Abstract :
Today data security plays an important role in the field of software and quality of service, Cloud computing focuses a new challenging security threats. Therefore, a data security model must solve the most challenges of cloud computing security. Cloud computing is a capable technology to make easy development of large-scale, on-demand, flexible computing infrastructures. The concept of cloud computing has changed the view of infrastructure architectures, software delivery and development models. Cloud computing incorporates elements from grid computing, utility computing and autonomic computing to an innovative deployment architecture. This paper presents an overview and the study of the cloud computing. Also include the several security and challenging issues, emerging application and the future trends of cloud computing. To overcome this I use the concept of Mobile OTP for providing authentication, whose purpose is to ensure security in cloud environment.
Key-Words / Index Term :
Cloud computing security, Authentication, OTP, Dynamic Password, Time Synchronization, Information and communication security, Trust
References :
[1] A. Kundu, C. D. Banerjee, P. Saha, “Introducing New Services in Cloud Computing Environment”, International Journal of Digital Content Technology and its Applications, AICIT, Vol. 4, No. 5, pp. 143-152, 2010.
[2] B. Rajkumar, C. Yeo, S. Venugopal, S. Malpani, Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems (2009).
[3] Pring et al., “Forecast: Sizing the cloud; understanding the opportunities in cloud services,” Gartner Inc., Tech. Rep. G00166525, March 2009.
[4] S. Subashini, V. Kavitha, “A survey on security issues in service delivery models of cloud computing”; Journal of Network and Computer Applications, Vol. 34(1), pp 1–11, Academic Press Ltd., UK, 2011, ISSN: 1084-8045.
[5] V. Krishna Reddy, B. Thirumal Rao, Dr. L.S.S. Reddy, P.Sai Kiran “Research Issues in Cloud Computing “ Global Journal of Computer Science and Technology, Volume 11, Issue 11, July 2011.
[6] Shivlal Mewada, Umesh Kumar Singh and Pradeep Kumar Sharma, " A Novel Security Based Model for Wireless Mesh Networks”, ISROSET- IJSRNSC, Vol-1, Issue-1, pp(11-15), March-April 2013.
[7] Shivlal Mewada, Umesh Kumar Singh, Pradeep Sharma,“Security Based Model for Cloud Computing”, Int. Journal of Computer Networks and Wireless Communications (IJCNWC), Vol. 1, No. 1, pp (13-19), December 2011.
[8] Rajesh Piplode, et al. , “Study of Threats, Risk and Challenges in Cloud Computing”, IJSRCSE Vol-1, issue-1 pp (26-30) Jan- Feb 2013
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.