Three-Way Authentication for Transaction Using Cloud Computing

Authors

  • Anjali Chillal
  • Jyoti Patil
  • Kiran Shendge
  • Ashwini Hiremath
  • K. M. Tamboli

Keywords:

Application Programming Interface (API), Authentication, Fingerprint, Java Database Connectivity (JDBC), Java Server Pages (JSP)

Abstract

The main objective of this research is to employ the Three Factor Authentication approach to make cloud computing more secure. A foolish assumption to carry out, we will most likely make use of a standard ABS. Furthermore, just divide the client's secret key into two halves. While one portion is stored on the client's PC, another is integrated into the security device. Since the attacker may have traded off one of the elements in three 3FA and regular ABS does not guarantee that the spilling of part of the secret key does not damage the security of the plan, extraordinary thought must be given to the process. Furthermore, since the security device shouldn't be able to handle the bulk of the computation, the component should be completed in a way that places the majority of the weight on the client's PC. Even though the new method of cloud computing offers many benefits, there are still some issues with security and authentication, particularly for web-based cloud computing services. As sensitive data may be stored in the cloud for convenience or security reasons, and as eligible users may also access the cloud for a variety of applications and services, user authentication poses a significant challenge for any cloud system. With the help of the One Time Password (OTP) & the Lightweight Security Device, both of which are used for user authentication, the proposed three fine-grained (3FA) approaches provide the cloud with more security. As a result, this system resolves the user authentication issue, which is a major challenge for the cloud system. As a user or authority uploads a file to the cloud, that file is divided into several blocks, increasing security. This prevents any hacker from being able to access the entire file. It has been demonstrated that the suggested 3FA access control solution maintains client security while allowing control over the cloud server and limiting access to customers with comparable property plans. An in-depth analysis of security reveals that the proposed 3FA get-to-control structure covers all security requirements.

Published

2023-10-31

Issue

Section

Articles