Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/311660
Title: Multi Level Authentication for Accessing Cloud Services through Rest API
Researcher: MJ BALACHANDRAN
Guide(s): P SUJATHA
Keywords: Arts and Humanities
Arts and Recreation
Humanities Multidisciplinary
University: Vels University
Completed Date: 2019
Abstract: newlineCloud computing is a set of IT services that are provided to a customer over a newlinenetwork on a leased basis and with the ability to scale up or down their service newlinerequirements. Usually, cloud computing services are delivered by a third party newlineprovider who owns the infrastructure. Its advantages to mention but a few include newlinescalability, resilience, flexibility, efficiency and outsourcing non-core activities. newlineCloud computing offers an innovative business model for organizations to adopt newlineIT services without upfront investment. Despite the potential gains achieved newlinefrom cloud computing, the organizations are slow in accepting it due to newlinesecurity issues and challenges associated with it. Security is one of the major issues newlinewhich hamper the growth of the cloud. The idea of handing over important data to newlineanother company is worrisome; such that the consumers need to be vigilant in newlineunderstanding the risks of data breaches in this new environment. newlineTo implement the multi-level authentication for accessing the cloud services newlinethrough REST API, this research work includes bio-metric authentication consisting newlineof 6 phases such as Jelastic Server Authentication, Root Signature generation, the transition of Root Signature through SMTP, Encryption through AES, File newlineauthentication and timeline privileges. newlineBoundary splitting algorithm is used to split the fingerprint image into eight newlineparts and Merkle Hash Trees takes input as eight split parts, so that it creates root newlinesignature for the provided fingerprint image and with the help of AES security newlinemechanism and timeline privileges enhanced security is ensured. This research has newlinetaken the base as RESTPL in Cloud computing and built the above said security features to protect against any kind of attacks and makes the administrator or the user access the file or data in a more secure manner. This entire research work was intended for the implementation of the combination of RESTPL, various levels of security authentication including bio-metric along with the timeline privilege.
Pagination: 
URI: http://hdl.handle.net/10603/311660
Appears in Departments:Computing Sciences

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File332.73 kBAdobe PDFView/Open
02_certificate[1].pdf356.28 kBAdobe PDFView/Open
03_contents.pdf371.28 kBAdobe PDFView/Open
07_chapter 1.pdf571.87 kBAdobe PDFView/Open
08_chapter 2.pdf437.08 kBAdobe PDFView/Open
09_chapter 3.pdf640.67 kBAdobe PDFView/Open
10_chapter 4.pdf2.09 MBAdobe PDFView/Open
11_chapter 5.pdf819.76 kBAdobe PDFView/Open
12_chapter 6.pdf816.23 kBAdobe PDFView/Open
13_chapter 7.pdf895.97 kBAdobe PDFView/Open
80_recommendation.pdf1.22 MBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: