Implementing High Grade Security in Cloud Application using Multifactor Authentication and Cryptography

As a high-speed internet foundation is being developed and people are informationized, most of the tasks are engaged in internet field so there is a risk that any private data like personal information or applications for managing money can be wiretapped or eavesdropped. The consolidation of One Time Passwords (OTPs) and Hash encryption algorithms are used to evolve a more secured password-protected web sites and data storage systems. The new outlined scheme had higher security, small system overhead and is easy to implement.

[1]  Hyotaek Lim,et al.  OTP Authentication Protocol Using Stream Cipher with Clock-Counter , 2009 .

[2]  Sagar Acharya,et al.  Two Factor Authentication Using Smartphone Generated One Time Password , 2013 .

[3]  Gurleen Kour,et al.  One Time Password Security through Cryptography For Mobile Banking , 2011 .

[4]  Sugata Sanyal,et al.  A Multifactor Secure Authentication System for Wireless Payment , 2010, Emergent Web Intelligence.

[5]  P. Haritha,et al.  Multi-factor Authentication in Cloud Computing for Data Storage Security , 2014 .

[6]  John Romkey Two Factor Authentication, SMS and NIST , 2016 .

[7]  Yashpal Kadam Security Issues in Cloud Computing A Transparent View , 2011 .

[8]  Hyotaek Lim,et al.  Online banking authentication system using mobile-OTP with QR-code , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.

[9]  Paul C. van Oorschot,et al.  Security and usability: the gap in real-world online banking , 2008, NSPW '07.

[10]  Muhammad Khurram Khan,et al.  OTP-Based Two-Factor Authentication Using Mobile Phones , 2011, 2011 Eighth International Conference on Information Technology: New Generations.

[11]  Sugata Sanyal,et al.  A Multi-Factor Security Protocol for Wireless Payment - Secure Web Authentication using Mobile Devices , 2011, ArXiv.

[12]  Anne Boehm,et al.  Murach's ADO.NET 4 Database Programming with C# 2010 , 2011 .

[13]  Wassim El-Hajj,et al.  Two factor authentication using mobile phones , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.

[14]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[15]  Jesse Liberty,et al.  Programming ASP.NET 3.5 , 2008 .