Multi Level Authentication for Accessing Cloud Services through Rest API
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
newlineCloud computing is a set of IT services that are provided to a customer over a
newlinenetwork on a leased basis and with the ability to scale up or down their service
newlinerequirements. Usually, cloud computing services are delivered by a third party
newlineprovider who owns the infrastructure. Its advantages to mention but a few include
newlinescalability, resilience, flexibility, efficiency and outsourcing non-core activities.
newlineCloud computing offers an innovative business model for organizations to adopt
newlineIT services without upfront investment. Despite the potential gains achieved
newlinefrom cloud computing, the organizations are slow in accepting it due to
newlinesecurity issues and challenges associated with it. Security is one of the major issues
newlinewhich hamper the growth of the cloud. The idea of handing over important data to
newlineanother company is worrisome; such that the consumers need to be vigilant in
newlineunderstanding the risks of data breaches in this new environment.
newlineTo implement the multi-level authentication for accessing the cloud services
newlinethrough REST API, this research work includes bio-metric authentication consisting
newlineof 6 phases such as Jelastic Server Authentication, Root Signature generation, the transition of Root Signature through SMTP, Encryption through AES, File
newlineauthentication and timeline privileges.
newlineBoundary splitting algorithm is used to split the fingerprint image into eight
newlineparts and Merkle Hash Trees takes input as eight split parts, so that it creates root
newlinesignature for the provided fingerprint image and with the help of AES security
newlinemechanism and timeline privileges enhanced security is ensured. This research has
newlinetaken the base as RESTPL in Cloud computing and built the above said security features to protect against any kind of attacks and makes the administrator or the user access the file or data in a more secure manner. This entire research work was intended for the implementation of the combination of RESTPL, various levels of security authentication including bio-metric along with the timeline privilege.