Two-Factor Data Security Protection Mechanism for Cloud Storage System

0
918
Two-Factor Data Security Protection Mechanism for Cloud Storage System

Two-Factor Data Security Protection Mechanism for Cloud Storage System

Abstract

In this paper, we propose a two-factor data security mechanism for cloud storage system with factor revocability. Our system allows a sender to use a cloud storage server to send an encrypted message to a receiver. Two-Factor Data Security Protection Mechanism for Cloud Storage System The sender only needs to know the receiver’s identity, but no other information (such as their public key or certificate).

Two-Factor Data Security Protection Mechanism for Cloud Storage System The receiver has to have two things to decrypt the ciphertext. Without either piece, it is impossible to decrypt the ciphertext. The cloud server can do this, which will immediately execute some algorithms to change the existing ciphertext to be un-decryptable by this device. This process is completely transparent for the sender. Moreover, the cloud server can not decrypt any ciphertext at any time. The analysis of security and efficiency shows that our system is not only safe but also practical.
 

Advantages

  • The solution not only enhances the confidentiality of the data, but also offers the revocability of the device so that once the device is revoked; the corresponding cipher text will be updated automatically by the cloud server without any notice of the data owner.
  • The cloud server cannot decrypt any cipher text at any time.

Disadvantages

  • If the user has lost his security device, then his/ her corresponding cipher text in the cloud cannot be decrypted forever! That is, the approach cannot support security device update/revocability.
  • The sender needs to know the serial number/ public key of the security device, in additional to the user‟s identity/public key. That makes the encryption process more complicated.

System Configuration

H/W System Configuration
Speed                   : 1.1 GHz
 
RAM                      : 256 MB(min)
 
Hard Disk              : 20 GB
 
Floppy Drive          : 1.44 MB
 
Key Board             : Standard Windows Keyboard
 
Mouse                  : Two or Three Button Mouse
 
Monitor                : SVGA
 
S/W System Configuration
 
 
Platform                     :  cloud computing

 
Operating system       : Windows Xp,7,
 
Server                       : WAMP/Apache
 
Working on                : Browser Like Firefox, IE

Conclusion

In this paper, we presented a novel two-factor information security assurance tool for distributed storage frameworks in which an information sender is permitted to encode the information by just learning a collector’s personality, while the beneficiary is required to use his / her mystery key and a security gadget to access information.