A Secure Two Factor Authentication Scheme with End to End Decryption

Authors

  • T. Vijay Kumar
  • Sybi Cynthia J

Abstract

Network security is the process of avoiding unauthorized persons enters into the networks.  It consists of various policies to avoid unwanted users.  It is very difficult task.  It was handled by network experts only.  It provides the access control in the current network system. It was controlled and managed by network administrator.  In companies are not use the security policy the companies confidential data is accessed by others.  Network security plays a very important role in various places.  In hospitals patients medical records also take by some other unwanted persons without using security system.  Before transfer the data through transmission medium it is encrypted.   Encryption is the task of converting data into the unreadable form to any people using security algorithms.  Thos process of converting the unreadable form data to readable form is called decryption.  The data transferred with the public key and private from source to destination.  Public key is common for more than one persons but the private key is used by specific persons only.   In traditional networking system single key factor method is used for secure the data. This proposed system two factor key technique is used.  This system is more secure compared with existing security systems. In cloud computing the data stored in third party data storage area.  Here security concept categorized by two types: security issues related to cloud service provides and security issues related to users.  In this proposed system is used to provide the authentication system by using two factor methods in cloud computing environment.

Downloads

Published

2020-04-15

Issue

Section

Articles