A Certificate Technique and Two Factor Authentication for Cloud Security Adaptation

Authors

  • Tejaswini B, K. Amuthabala

Abstract

The unforeseen nature of Cloud Computing visibility as well as manage among the data owners, applications, along with cloud providers raises tenants vagueness when utilizing cloud based services. Adaptation methods offer a reliable infrastructure based on cloud with assured behavior that preserves the excellence of service for tenants. Existing adaptation methods mainly concentrate on work qualities as well as they use non verifiable proof that is gathered in non-trust worthy manner. In this work, we recommend a technique for security-oriented adaptation for the cloud, dependent on the evidence gathered through trustworthy resources of a certificate procedure along with two factor authentication mechanisms. With this approach the cloud will keep stable security attribute over the time, through continuously confirming certificate validity with a digital signature with Google cloud KMS along with two factor authentication of the certificate. To protect users against digital identity theft, 2FA (Two-factor authentication) is a famous technique. Two-factor authentication connections access online information as well as accounts to having 2 or more than two tokens which show permission or ownership. It utilizes the output of verification actions and provides a model, in which corresponding configuration is utilized as the origin for adaptation.

Downloads

Published

2020-05-16

Issue

Section

Articles