ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.6, No. 5)

Publication Date:

Authors : ; ; ; ;

Page : 471-475

Keywords : Two factor; cloud storage; mobile security;

Source : Downloadexternal Find it from : Google Scholarexternal


The rate of upgrading traditional mobile phones to smartphones is escalating due to the functionality they provide. A multitude of data is stored in phones and many applications require a great deal of memory to run. However, smartphones have limited memory. This limitation can be overcome by using cloud storage. It also provides services like easy data access and sharing. Since the cloud storage is generally hosted by third parties, there is a risk of unauthorized access to data and security is one of the primary concerns. In this paper, we propose a twofactor approach for enhancing the security of cloud data. The system allows the user to store encrypted data in the cloud. Data is encrypted using user's secret key and device id. The user needs to possess both the security key and device key for decrypting and accessing the data. Since the device key is directly extracted from the device, we need to use the same device for encryption and decryption. Even if the device is lost or stolen, it cannot be used to decrypt data due to lack of security key. If the CSP tries to steal data, it will be missing some keys and hence will be unable to decipher the information.

Last modified: 2017-05-23 19:52:20