20
PRESENTED BY K.PRATHAP KUMAR 8051020051 ‘B’ SECTION GUIDED BY MR. AUGUSTINE ISAAC ., ME ., AP(SR.GRADE) SRM UNIVERSITY MULTI LEVEL AUTHENTICATION TECHNIQUE FOR ACCESSING CLOUD SERVICES

Review 21

Embed Size (px)

Citation preview

PRESENTED BYK.PRATHAP KUMAR

8051020051‘B’ SECTIONGUIDED BY

MR. AUGUSTINE ISAAC ., ME ., AP(SR.GRADE)SRM UNIVERSITY

MULTI LEVEL AUTHENTICATION

TECHNIQUE FOR ACCESSING CLOUD SERVICES

ABSTRACT

• Cloud computing is an emerging, on-demand and internet - based technology.

• It provides variety of services over internet such as, software, hardware, data storage and infrastructure.

• This technology has been used by worldwide customers to improve their business performance.

• However, to utilize these services by authorized customer, it is necessary to have strict authentication check.

ABSTRACT conti….

At present, authentication is done in several ways: such as, textual, graphical, bio-metric, 3D password and third party authentication.

This paper presents the strict authentication system by introducing the multi-level authentication technique which generates/authenticates the password in multiple levels to access the cloud services.

Existing System:

• In an Existing system have authentication technique.

• It provides Verity of Services over internet , such as

• Simple text password• 3rd party authentication • Graphical password• Biometric • 3D password

Drawbacks:

Minimum level authentication

Not Applicable for remote and Internet users.

Easy to hack

Proposed System:

It generates the password and concatenates the generated password at multilevel.

Based on the leaf level concatenated password, one can access the cloud services provided that the password authentication is successful in all the previous levels.

Authenticated clients organizations that access the cloud services.

Advantages:

Highly Authenticated.Generate multilevel password processHighly SecuredBreaking the authentication is 0.001

System Architecture

Modules

• Admin Module

• Key Generation Module

• Organization Module

• Team Leader Module

• Team Member Module

Admin Module

The purpose of admin is to maintain the details about the Organization, Team Leaders and Employees.

Information stored in the cloud is authenticated by admin using multi level authentication process.

Key Generation Module:

Key generation Module provides the key for Authentication by multi level.

Key is providing by admin. This key is having the text password and

individual information. This information is vary depends on cloud

user based on multi level authentication.

Organization Module

In this module Organization send request to admin to get key for access data from the cloud.

The key given by admin is based on organization details. By using this process the Organization can access files with valid authentication.

Team Leader ModuleTeam Leader must provide their user name

and password to access information from the cloud.

Team Leaders are the next level of organization.

After providing key to organization the admin give permission to team leader by providing separate key to them.

The key having details about the team leaders.

Team Member ModuleIn this module the team member also

provide the username and password to access information the cloud.

Team members are the second level of organization.

After providing key to team leader the admin give permission to team member by providing separate key to them.

The key having details about the employees in the organization.

Screen shots

login

Key generation

Future work

This is the future work of our research. Our future work will be carried out in adding multi-dimensional password generation method to multi-level authentication technique.

References•  • [1]. IEEE - The Application of Cloud Computing in Education Informatization,

Modern Educational Tech... center Bo Wang, HongYu Xing.• [2]. NIST Definition http://www.au.af.mil/au/awc/awcgate/nist/cloud-def-

v15.doc• [3].CA Technologies cloud authentication system

http://www.ca.com/us/authentication-system.aspx• [4]. X. Suo, Y. Zhu, G. S. Owen, “Graphical passwords: A survey,” in Proc. 21st

Annual Computer Security Application.• Conf. Dec. 5–9, 2005, pp. 463–472.• [5] S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon,

“Authentication using graphical passwords: Basic results,” • in Proc. Human-Comput. Interaction Int., Las Vegas, NV, Jul. 25–

27, 2005.• [6] Fawaz A. Alsulaiman and Abdulmotaleb El Saddik,“Three-Dimensional

Password for More Secure Authentication,” IEEE, • http://ieeexplore.ieee.org., Last Updated – 6 Feb 2008• [7] Cloud Computing services & comparisons

http://www.thbs.com/pdfs/Comparison%20of%20Cloud%20computing%20services.pdf

• [8] A User Identity Management Protocol for Cloud Computing Paradigm Safiriyu Eludiora1, Olatunde Abiona2, Ayodeji Oluwatope1, Adeniran Oluwaranti1, Clement Onime3,Lawrence Kehinde apered in Int. J. Communications, Network and System Sciences, 2011, 4, 152-163

THANKING YOU