Two-Factor Data Security Protection Mechanism for Cloud Storage System - 2016


In this paper, we propose a 2-factor information security protection mechanism with issue revocability for cloud storage system. Our system allows a sender to send an encrypted message to a receiver through a cloud storage server. The sender only wants to understand the identity of the receiver but no other info (such as its public key or its certificate). The receiver needs to possess 2 things in order to decrypt the ciphertext. The primary issue is his/her secret key stored in the pc. The second factor may be a distinctive personal security device that connects to the pc. It's not possible to decrypt the ciphertext while not either piece. Additional importantly, once the safety device is stolen or lost, this device is revoked. It cannot be used to decrypt any ciphertext. This will be done by the cloud server that will immediately execute some algorithms to change the existing ciphertext to be un-decryptable by this device. This process is completely transparent to the sender. Furthermore, the cloud server cannot decrypt any ciphertext at any time. The protection and efficiency analysis show that our system isn't solely secure however also practical.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : A Patient-Centric Healthcare Framework Reference Architecture for Better Semantic Interoperability based on Blockchain, Cloud, and IoT ABSTRACT: The application-centric perspective gives rise to the distributed
PROJECT TITLE : Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model Sign In Or Purchase - 2017 ABSTRACT: Authenticated key exchange (AKE) protocol permits a
PROJECT TITLE :Critical communications and public safety networks, part 2: technical issues, security, and applications [Guest Editorial]ABSTRACT:As we tend to mentioned in the Guest Editorial of Part 1 of this Feature Topic,
PROJECT TITLE: Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services - 2016 ABSTRACT: In this paper, we tend to introduce a replacement fine-grained 2-factor authentication (2FA) access management system
PROJECT TITLE :Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control SystemsABSTRACT:Critical infrastructures, such

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry