Password Security using Mutation Technique in Cloud Computing |
||
|
|
|
© 2024 by IJCTT Journal | ||
Volume-72 Issue-8 |
||
Year of Publication : 2024 | ||
Authors : Priyank Singh, Shobhit Kukreti, Tanvi Hungund | ||
DOI : 10.14445/22312803/IJCTT-V72I8P101 |
How to Cite?
Priyank Singh, Shobhit Kukreti, Tanvi Hungund, "Password Security using Mutation Technique in Cloud Computing," International Journal of Computer Trends and Technology, vol. 72, no. 8, pp.1-6, 2024. Crossref, https://doi.org/10.14445/22312803/IJCTT-V72I8P101
Abstract
In recent decades, Cloud computing has gained importance in the field, whether it is the IT sector, the Health sector or Supply Chain Management. Thus, due to its convenience, many people are turning towards the Cloud. Therefore, this demand creates the need for a new CSP to come into the market so that end users can store and share their private and sensitive data. Nevertheless, the greatest concern in Cloud Security is the customer’s utilization and the prevention of the services. Hence, the following security measures have been taken by the cloud service provider. This paper aims to enhance the level of password protection. To overcome this, we have proposed a password security technique which is known as the string mutation technique to avoid such attacks. Also, the password is stored after applying the md5 hash which is the popular method of converting the plain text password into a hashed format. We have employed them. Thus it can be stated that the described technique can be applied through the Net platform. In the result section, the result of execution has been represented.
Keywords
Cloud Security, Password Encryption, MD5 hashing, Data security.
Reference
[1] S. Subashini, and Veeraruna Kavitha, “A Survey on Security Issues in Service Delivery Models of Cloud Computing,” Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1-11, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Pramod S. Pawar et al., “Security-As-A-Service in Multi-Cloud and Federated Cloud Environments,” Trust Management IX: 9th IFIP WG 11.11 International Conference, Hamburg, Germany, pp. 251-261, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Nikhitha K. Nair, K.S. Navin, and Soya Chandra, “Digital Signature and Advanced Encryption Standard for Enhancing Data Security and Authentication in Cloud Computing,” International Journal for Research in Applied Science & Engineering Technology, vol. 3, no. 3, pp. 240-244, 2015.
[Google Scholar] [Publisher Link]
[4] Wang Cong, et al., “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” 2010 Proceedings IEEE INFOCOM, San Diego, CA, USA, pp. 1-9, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Amit Hendre, and Karuna Pande Joshi, “A Semantic Approach to Cloud Security and Compliance,” 2015 IEEE 8th International Conference on Cloud Computing, New York, NY, USA, pp. 1081-1084, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Abhirup Khanna, and Sarishma, Mobile Cloud Computing: Principles and Paradigms, Krishan Makhijani, pp. 1-232, 2016.
[Publisher Link]
[7] Abhirup Khanna, and Sarishma, “RAS: A Novel Approach for Dynamic Resource Allocation,” 2015 1st International Conference on Next Generation Computing Technologies (NGCT), Dehradun, India, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[8] MD5 Class, System.Security.Cryptography, .NET. [Online]. Available: https://docs.microsoft.com/en-us/dotnet/api/system.security.cryptography.md5?view=net-5.0
[9] Wei Huang et al., “The State of Public Infrastructure-As-A-Service Cloud Security,” ACM Computing Surveys, vol. 47, no. 4, pp. 1-31, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Asish Aich, Alo Sen, and Satya Ranjan Dash, “A Survey on Cloud Environment Security Risk and Remedy,” 2015 International Conference on Computational Intelligence and Networks, Odisha, India, pp. 192-193, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Aarti Singh, and Manisha Malhotra, “Security Concerns at Various Levels of Cloud Computing Paradigm: A Review,” International Journal of Computer Networks and Applications, vol. 2, no. 2, pp. 41-45, 2015.
[Google Scholar] [Publisher Link]
[12] Rfc2898DeriveBytes Class, System.Security.Cryptography, .NET. [Online]. Available: https://learn.microsoft.com/enus/dotnet/api/system.security.cryptography.rfc2898derivebytes?view=net-8.0