Improved Performance for Secured Authentication in User Devices and Cloud Environment
Veena R.S1, Ramachandra V. Pujeri2, Indiramma M3
1Veena R.S, Associate Professor and Head Dept. of Computer Science & Engineering. K. S. School of Engineering and Management, Bengaluru, India.
2Ramachandra V. Pujeri, Director M.I.T College of Engineering, Pune, India.
3Indiramma M, Professor Dept. of Computer Science & Engineering, BMS College of Engineering, Bengaluru, India.

Manuscript received on January 02, 2020. | Revised Manuscript received on January 15, 2020. | Manuscript published on January 30, 2020. | PP: 1760-1769 | Volume-8 Issue-5, January 2020. | Retrieval Number: E6329018520/2020©BEIESP | DOI: 10.35940/ijrte.E6329.018520

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In the last few years, various researchers have identified that securing the cloud environment requires quite a challenging decision to be made as identifying the correct security parameter is difficult. This paper presents” SRAAM: Secure Resource Access Authentication Mechanism”, a collaborative framework between user mobile device and cloud infrastructure, for authenticating user and device credentials. An experimental prototype is done for proof of concept and performance matrices are evaluated based on the important decision making parameters. Also, a novel model called as Integrated Framework for Cloud Security (IFCS) that performs mainly three task i) faster and robust user authentication, ii) maintaining anonymity of data storage location, and iii) securing the virtualization platform. An experimental approach is adopted in order to testify the proposed system. Total algorithm processing time in contrast to frequently adopted security protocols in existing system.
Keywords: Authentication, cryptanalysis, Cloud Computing, Data Access, Cloud Security, Data Security, Access Control, Key Management, Authentication.
Scope of the Article: Cloud, Sensor Cloud And Mobile Cloud Security.