Affiliation:
1. School of Computing Science and Engineering, Galgotias University, Greater Noida, Uttar Pradesh, India
Abstract
Aims and Background:
Accessing data services on the cloud raises serious concerns
about security and privacy. To verify a client's stated identity, the existing authentication approach
uses just one authentication factor. However, traditional techniques of one-factor authentication
are inefficient since they demand an excessive amount of user information and expose their private
data to eavesdropping.
Methods:
Cloud-based data storage is susceptible to both external and internal threats. Information
security relies heavily on authentication, which is a method for verifying user identities
before granting them access to protected data. When it comes to protecting data in a cloud computing
environment from the most cutting-edge methods of attack, traditional password authentication
simply isn't enough. For the purpose of protecting user identities in the cloud, this study presents
interactive multi-layer authentication systems. Various access control policies are used when
validating users in the cloud. Registration, permissions, and authentication factors for users are all
parts of the cloud app's security process.
Results:
An intrusion detection system is built into the security mechanism to help identify people
who could be malevolent. Various techniques are available for user identity verification, including
intrusion detection, access control, and multi-factor authentication. The last step is to encrypt the
data so that no one else can read it.
Conclusion:
To guarantee the effectiveness and accuracy of the suggested frameworks and methodology,
they are experimentally evaluated. There were few false positives and a high detection rate.
Publisher
Bentham Science Publishers Ltd.