email   Email Us: info@lupinepublishers.com phone   Call Us: +1 (914) 407-6109   57 West 57th Street, 3rd floor, New York - NY 10019, USA

Lupine Publishers Group

Lupine Publishers

  Submit Manuscript

ISSN: 2643-6744

Current Trends in Computer Sciences & Applications

Research Article(ISSN: 2643-6744)

Multidimensional: User with File Content and Server’s Status Based Authentication for Secure File Operations in Cloud

Volume 1 - Issue 5

Jims Marchang1*, Jing Wang1, Abayomi Otebolaku1, Timi Enamamu1, Daniel Porter2 and Benjamin Sanders3

  • Author Information Open or Close
    • 1Department of Computing, Sheffield Hallam University, United Kingdom
    • 2Content Guru Limited, Berkshire, United Kingdom
    • 3Winchester University, United Kingdom

    *Corresponding author: Jims Marchang, Department of Computing, Sheffield Hallam University, United Kingdom

Received: November 13, 2019;   Published: November 22, 2019

DOI: 10.32474/CTCSA.2019.01.000121

Full Text PDF

To view the Full Article   Peer-reviewed Article PDF

Abstract

The popularity of data storage in cloud servers is getting more and more favored in recent times. Its ease of storage, availability and synchronization of personalized cloud file storage using client applications made cloud storage more popular than ever. In cloud storage system, using a basic authentication method like username and password are still one of the most popular forms of authentication. However, the security ensure by such traditional authentication method is weak and vulnerable because the username and password can be compromised by intruders or the user account can be left open by forgetting to logoff in public computers, leading to exposure of information to unauthorized users and hackers. In recent years, using a two-factor authentication has become a trend throughout network-based cloud services, online banking system and any form of services that requires user authentication. Here, in this paper a second layer authentication in the form of session key is used to ensure the authenticity of the activities of the user after user’s web-based account is logged-in successfully. The interesting and the critical contribution in this paper is the way the session key is generated and delivers to the authentic user. The key is generated by using the hash value of the file content, file size, file last modified, pseudo-random generated by the server using CPU temperature, clock speed, system time, and network packet timings, and user based 8 digit random position selection from a 32 digit Hex to mitigate against the attacker while performing vital file activities which may lead to data lost or data destruction or when user’s credentials are compromised.

Keywords: Cloud file server; session key; un-authorized users; intruders, second factor authentication

Abstract| Introduction| Analysis and Discussion| Usability and Trust Analysis of the System| Conclusion and Future Direction| Compliance with Ethical Standards| References|

https://www.high-endrolex.com/21