INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MATHEMATICAL THEORY (IJCSMT )

E-ISSN 2545-5699
P-ISSN 2695-1924
VOL. 9 NO. 5 2023
DOI: https://doi.org/10.56201/ijcsmt.v9.no5.2023.pg139.149


Mitigating Malicious Software Threat in Cloud Computing Models Using-Multi-Factor-Authentication-in-Cloud-Computing

Oguji Francis Chikezie., Amanze B.C., Agbakwuru O.A & Agbasonu V.C


Abstract


This paper mitigating malicious software threat in the cloud computing models is on securing cloud computing platforms. Cloud storage providers store the data in multiple servers maintained by hosting companies. This increases the risk of unauthorized access to the private data. Even though the cloud continues to gain popularity in usability and attraction, the problems lies with data confidentiality, loss of control, lack of trust, data theft and the fact that user data is stored in unencrypted format. This can subject the data to malicious software threats. This paper focuses on malicious software threats presented by cloud service providers. Using encryption techniques and intrusion detection system, the risk of unauthorized access can be controlled. In the proposed methodology, a user encrypts files with secret keys before uploading them into the cloud. Once encrypted, the file is stored in an encrypted format in the cloud. For a user to download files form the cloud, the file owner first accepts a request by an authorized user, and an application server provides an Access key. Using an access key, a user downloads data and uses a secret key to convert cipher text into a plain text. This technique ensures end-to-end encryption and completely hides the data from cloud service providers hence maintain confidentiality. Implementation involved building an encryption application algorithm, for deployment on the user computer. The system is simulated using a web-system developed with PHP, MySQL and JavaScript. The System design followed the OODM methodology. The software performance was tested using speed of data retrieval and security of the data protection. The security looks at the ability of the system to determine fraudulent users and deny them access to the system. The result obtained from the new system developed shows a high level of data security level as compare to existing system that uses only password for authentication.


keywords:

Multi-factor authentication, Cloud computing Platforms, Data Protection and Software Threats.


References:


Subashini, S. and Kavitha, V. (2018). A Survey on Security Minimal issues in service delivery
models of cloud computing Journal of Network and Computer Applications, 34(1),
1- 11

Kaufman, L. M. (2020). Can public-cloud security meet its unique challenges? Security &
Privacy, IEEE 8.4 (2020): 55-57

Badger, L., Grance, T., Patt-Corner, R. and Voas, J. (2015). Cloud computing synopsis and
recommendations (draft), nist special publication 800-146, Recommendations of the
National Institute of Standards and Technology, Tech. Rep.

Dunlop, M.; Groat, S.; Shelly, D. (2020). GoldPhish: Using Images for Content-Based
Phishing Analysis, Internet Monitoring and Protection (ICIMP), 2020 Fifth International
Conference, pp.123-128, May 2020


DOWNLOAD PDF

Back


Google Scholar logo
Crossref logo
ResearchGate logo
Open Access logo
Google logo