Sie sind auf Seite 1von 20

MULTI LEVEL AUTHENTICATION TECHNIQUE FOR ACCESSING CLOUD SERVICES

PRESENTED BY K.PRATHAP KUMAR 8051020051 B SECTION GUIDED BY MR. AUGUSTINE ISAAC ., ME ., AP(SR.GRADE) SRM UNIVERSITY

ABSTRACT
Cloud computing is an emerging, on-demand and

internet - based technology. It provides variety of services over internet such as, software, hardware, data storage and infrastructure. This technology has been used by worldwide customers to improve their business performance. However, to utilize these services by authorized customer, it is necessary to have strict authentication check.

ABSTRACT conti.
At present, authentication is done in several ways:

such as, textual, graphical, bio-metric, 3D password and third party authentication. This paper presents the strict authentication system by introducing the multi-level authentication technique which generates/authenticates the password in multiple levels to access the cloud services.

Existing System:
In an Existing system have authentication

technique. It provides Verity of Services over internet , such as Simple text password 3rd party authentication Graphical password Biometric 3D password

Drawbacks:
Minimum level authentication Not Applicable for remote and Internet users. Easy to hack

Proposed System:
It generates the password and concatenates the

generated password at multilevel. Based on the leaf level concatenated password, one can access the cloud services provided that the password authentication is successful in all the previous levels. Authenticated clients organizations that access the cloud services.

Advantages:

Highly Authenticated. Generate multilevel password process

Highly Secured
Breaking the authentication is 0.001

System Architecture

Modules
Admin Module Key Generation Module Organization Module Team Leader Module Team Member Module

Admin Module
The purpose of admin is to maintain the details

about the Organization, Team Leaders and Employees. Information stored in the cloud is authenticated by admin using multi level authentication process.

Key Generation Module:


Key generation Module provides the key for

Authentication by multi level. Key is providing by admin. This key is having the text password and individual information. This information is vary depends on cloud user based on multi level authentication.

Organization Module
In this module Organization send request to admin

to get key for access data from the cloud. The key given by admin is based on organization details. By using this process the Organization can access files with valid authentication.

Team Leader Module


Team Leader must provide their user name and

password to access information from the cloud. Team Leaders are the next level of organization. After providing key to organization the admin give permission to team leader by providing separate key to them. The key having details about the team leaders.

Team Member Module


In this module the team member also provide the

username and password to access information the cloud. Team members are the second level of organization. After providing key to team leader the admin give permission to team member by providing separate key to them. The key having details about the employees in the organization.

Screen shots

login

Key generation

Future work
This is the future work of our research. Our future

work will be carried out in adding multi-dimensional password generation method to multi-level authentication technique.

References

[1]. IEEE - The Application of Cloud Computing in Education Informatization, Modern Educational Tech... center Bo Wang, HongYu Xing. [2]. NIST Definition http://www.au.af.mil/au/awc/awcgate/nist/cloud-def-v15.doc [3].CA Technologies cloud authentication system http://www.ca.com/us/authenticationsystem.aspx [4]. X. Suo, Y. Zhu, G. S. Owen, Graphical passwords: A survey, in Proc. 21st Annual Computer Security Application. Conf. Dec. 59, 2005, pp. 463472. [5] S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, Authentication using graphical passwords: Basic results, in Proc. Human-Comput. Interaction Int., Las Vegas, NV, Jul. 2527, 2005. [6] Fawaz A. Alsulaiman and Abdulmotaleb El Saddik,Three-Dimensional Password for More Secure Authentication, IEEE, http://ieeexplore.ieee.org., Last Updated 6 Feb 2008 [7] Cloud Computing services & comparisons http://www.thbs.com/pdfs/Comparison%20of%20Cloud%20computing%20services.pdf [8] A User Identity Management Protocol for Cloud Computing Paradigm Safiriyu Eludiora1, Olatunde Abiona2, Ayodeji Oluwatope1, Adeniran Oluwaranti1, Clement Onime3,Lawrence Kehinde apered in Int. J. Communications, Network and System Sciences, 2011, 4, 152-163

THANKING YOU