Password Security using Mutation Technique in Cloud Computing

Agraj Magotra, Akansh Srivastava, Heena, Navjot Singh

Volume 5, Issue 4 2021

Page: 10-15

Abstract

In the past few decades, Cloud computing is playing a significant role in the industry, whether it's the IT sector, Health sector or supply chain management. As a result of its easy access, many people are going towards Cloud. Hence, this demand increases the existence of a new cloud service provider, allowing end-users to store and share their private and sensitive data. However, the biggest challenge in Cloud Security is the customer's adoption and prevention of its services. Therefore, several security measures have been adopted by the cloud service provider. This paper focuses on providing an advanced level of password security. We have presented a password security technique called the string mutation technique to prevent it from unauthorized access. Also, we have implemented the md5 hashing technique to encrypt the password before storing it in the database. We have used the .net platform to implement this technique. In the result section, we have shown the executed result.

Back Download



References

  • Subashini, Subashini, and Veeraruna Kavitha. 'A survey on security issues in service delivery models of cloud computing.' Journal of network and computer applications 34.1 (2011): 1-11.
  • Pawar, Pramod S., et al. 'Security-as-a-service in multi-cloud and federated cloud environments.' IFIP International Conference on Trust Management. Springer International Publishing, 2015.
  • Nair, Nikhitha K., K. S. Navin, and Soya Chandra. 'Digital Signature and Advanced Encryption Standard for Enhancing Data Security and Authentication in Cloud Computing.' (2015).
  • Wang, Cong, et al. 'Privacy-preserving public auditing for data storage security in cloud computing.' INFOCOM, 2010 Proceedings IEEE. Ieee, 2010.
  • Hendre, Amit, and Karuna Pande Joshi. 'A semantic approach to cloud security and compliance.' 2015 IEEE 8th International Conference on Cloud Computing. IEEE, 2015.
  • Khanna, Abhirup, Sarishma. (2015). Mobile Cloud Computing: Principles and Paradigms. IK International. 2017
  • Khanna, Abhirup. 'RAS: A novel approach for dynamic resource allocation.' Next Generation Computing Technologies (NGCT), 2015 1st International Conference on. IEEE, 2015.
  • https://docs.microsoft.com/en-us/dotnet/api/system.security.cryptography.md5?view=net-5.0
  • Huang, Wei, et al. 'The State of Public Infrastructure-as-a-Service Cloud Security.' ACM Computing Surveys (CSUR) 47.4 (2015): 68.
  • Aich, Asish, Alo Sen, and Satya Ranjan Dash. 'A Survey on Cloud Environment Security Risk and Remedy.' Computational Intelligence and Networks (CINE), 2015 International Conference on. IEEE, 2015.
  • Singh, Aarti, and Manisha Malhotra. 'Security Concerns at Various Levels of Cloud Computing Paradigm: A Review.' International Journal of Computer Networks and Applications 2.2 (2015): 41-45. 292
  • https://docs.microsoft.com/enus/dotnet/api/system.security.cryptography.rfc2898derivebytes?view=net-5.0

Looking for Paper Publication??

Come to us.