
A THREE-FACTOR APPROACH TO DATA SHARING AND SECURITY IN CLOUD STORAGE SYSTEMS
Abstract
In the realm of cloud storage systems, ensuring robust security and efficient data sharing is a critical concern due to the increasing volume and sensitivity of stored information. This study proposes a novel three-factor approach designed to enhance both data sharing and security in cloud storage environments. The proposed mechanism integrates three key factors: authentication, encryption, and access control, to create a comprehensive framework that addresses common security vulnerabilities and operational challenges.
The first factor, authentication, employs multi-factor authentication (MFA) to verify the identities of users accessing the cloud storage system. This ensures that only authorized individuals can initiate data sharing activities. The second factor, encryption, involves advanced cryptographic techniques to protect data both in transit and at rest. By encrypting sensitive information, the mechanism safeguards against unauthorized access and data breaches. The third factor, access control, utilizes granular permission settings to regulate user access based on roles and responsibilities, thereby minimizing the risk of data exposure.
The study details the design and implementation of this three-factor approach, including the technical specifications and integration processes with existing cloud storage infrastructures. Through a series of simulations and real-world case studies, the effectiveness of the proposed mechanism in enhancing data security and facilitating efficient sharing is evaluated. Results demonstrate a significant improvement in the protection of sensitive data and the management of user access, compared to traditional single-factor security models.
This research contributes to the field of cloud storage by providing a practical and effective solution to the dual challenges of data security and sharing. The proposed three-factor approach offers a scalable and adaptable framework suitable for various cloud storage applications, from personal data management to enterprise-level storage solutions. The findings underscore the importance of adopting multi-faceted security strategies to safeguard cloud-based information and enhance overall system integrity.
Keywords
Three-Factor Authentication, Data Sharing, Cloud Storage Security
References
Joseph K. Liu, Kaitai Liang, Willy Susilo, Jianghua Liu, and Yang Xiang, Senior Member, IEEE.“Two-Factor Data Security Protection Mechanism for Cloud Storage System.”June 2016.
Y.Kale, A.Patankar, “Enhanced Data Security Mechanism on Cloud Using Two-factor Authentication, Data Encryption and Key Sharing Mechanism” 15 June 2014 Pune.
A.Akavia. S.Goldwasser, and V. Vaikuntanathan“Simultaneous Hardcore Bits and Cryptography against Memory Attacks.” 2009.
A.Boldyreva, V. Goyal, V.Kumar “Identity-based Encryption with Efficient Revocation “2008.
Prveenkumar, J.Patil, “Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases”.
J.Shao & Z. Cao,”Multi-use unidirectional identitybased proxy re encryption from hierarchical identitybased encryption”, Info.Sci. 2012.
Vijay Varadharajan, Senior Member, IEEE, and Udaya Tupakula, Member, IEEE. IEEE Transactions on Network And Service Management,” Security as a Service Model for Cloud Environment”,Vol. 11, No. 1, March 2014 . Cong Wang, Student Member, IEEE, Sherman S.-M. Chow, Qian Wang, Student Member, IEEE, Kui Ren, Member, IEEE
Article Statistics
Downloads
Copyright License
Copyright (c) 2024 Ms. Shilpa Rao

This work is licensed under a Creative Commons Attribution 4.0 International License.