Cloud security: to prevent unauthorized access using an efficient key management authentication algorithm


  • S Naveen Kumar
  • K Nirmala





Cloud Computing, Data Storage, Cloud Security, Blowfish Algorithm, Ensure Correcting Code.


Presently a-days Cloud registering is rising field in light of its Performance, high accessibility, easily. Information store is principle             future that cloud benefit gives to the huge association to store tremendous measure of information. Yet at the same time numerous              associations are not prepared to execute distributed computing innovation since absence of security. So the principle goal of this paper is to understand the security issues and to anticipate unapproved access in distributed storage, it should be possible with the assistance of an effective validation strategy by utilizing cross breed verification calculation to give security of the information in cloud and guarantee amending code to keep up the nature of administration. In any case, solid client confirmation that confines illicit access to the               administration giving servers is the foremost prerequisite for securing cloud condition




[1] Dillon T, Wu C & Chang E, “Cloud Computing: Issues and Challengesâ€, 24th IEEE International Conference on Advanced Information Networking and Applications(AINA), (2010), pp.27-33.

[2] Zhou MQ, Zhang R, Xie W, Qian WN & Zhou A, “Security and Privacy in Cloud Computing: A Surveyâ€, Sixth International Conference on Semantics, Knowledge and Grids(SKG), (2010), pp.105-112.

[3] Yang JF & Chen ZB, “Cloud Computing Research and Security Issuesâ€, IEEE International Conference on Computational Intelligence and Software Engineering (CiSE), (2010), pp.1-3.

[4] Zhang S, Zhang SF, Chen XB & Huo XZ, “Cloud Computing Research and Development Trendâ€, Proceedings of the Second International Conference on Future Networks, (2010), pp. 93-97.

[5] Kuptsov D, Khurri A & Gurtov A, “Distributed user authentication in Wireless LANsâ€, IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops, (2009), pp.1-9.

[6] Tsai CS & Hung CI, “An Enhanced Secure Mechanism of Access Controlâ€, Second International Conference on Communication Systems, Networks and Applications (ICCSNA), pp.119-122, (2010).

[7] Chen TH, Yeh HL & Shih WK, “An Advanced ECC Dynamic ID-Based Remote Mutual Authentication Scheme for Cloud Computingâ€, IEEE conf. on Multimedia and Ubiquitous Engineering, (2011).

[8] Ibrahem MK, “Modification of Diffie-Hellman key exchange algorithm for Zero knowledge proofâ€, future Communication Networks (ICFCN), (2012), pp.147-152.

[9] Dinesha H & Agrawal V, “Multi-level authentication technique for accessing cloud servicesâ€, International Conference on Computing, Communication and Applications, (2013), pp.1-4.

[10] Moyo T & Bhogal J, “Investigating Security Issues in Cloud Computingâ€, Eighth International Conference on Complex, Intelligent and Software Intensive Systems, (2014).

[11] Babaeizadeh M, Bakhtiari M & Mohammed AM, “Authentication Methods in Cloud Computing: A Surveyâ€, Research Journal of Applied Sciences, Engineering and Technology, (2015).

[12] Zarad MM, Abdel-Hafez AA & Hassanein AH, “Secure and Efficient Authentication Scheme for Cloud Computingâ€, International Journal of Computer Applications, (2016).

View Full Article: