DESIGN AND IMPLEMENTATION OF AN OTP BASED DATA SECURITY MODEL INCOPERATING AES AND SHA2 IN CLOUD ENVIRONMENT
Cloud computing has revolutionized the way computing and software services are delivered to the clients on demand. It offers users the ability to connect to computing resources and access IT managed services with a previously unknown level of ease. Thus, security concerns among users of the cloud have become a major barrier to the widespread growth of cloud computing. In this research work, we have used the 3 step security mechanism for the keeping the data secure at the cloud. We have implemented the strong authentication mechanism using AES encrypted OTP and enhanced the security of data using Cloud Broker and AES. When you log on to your machine and then try to access a resource, say a file server or database, something needs to assure that your username and password are valid. With sensitive data stored in the cloud of the different users, we need a strong authentication mechanism along with OTP. Data breaches because of no/weak authentication. Afterwards we have verified the integrity of data stored at cloud provider using SHA2. Multiple parameters like processing time, processing cost, AES encryption time, OTP generation and encryption time have been calculated and analyzed. We have been able to enhance the security by optimizing the processing time as well as processing cost. After implementing the proposed methodology, it has been summarized that the cloud security can be enhanced by applying the proposed mechanism. The proposed system has reduced the complexity, processing cost which increases the overall efficiency of the system.
 Kunal V. Raipurkar and Anil V. Deorankar , "Improve Data Security in Cloud Environment by using LDAP and Two Way Encryption Algorithm," IEEE, pp. 1-4, 2016.
 V.Swath, K.Sudha, R.Aruna, C.Sangeetha and R.Janani, "Providing Advanced Security Mechanism for Scalable Data Sharing In Cloud Storage," IEEE, pp. 1-6, 2016.
 Shivangi Sengar and Rajesh Kumar Chakrawarti, "Implementation of PDS System with Improved Security and Transparency under Cloud Environment," IEEE, pp. 1-6, 2016.
 Mohis M and Devipriya V S, "An improved approach for Enhancing Public Cloud Data Security through Steganographic Technique," IEEE, 2016.
 S. Pandey , A. Dwivedi , J. Pant and M. Lohani , "Security Enforcement using TRBAC in Cloud Computing," IEEE, pp. 1232-1238, 2016.
 R.K.Shyamasundar, N.V.Narendra Kumar and Muttukrishnan Rajarajan, "Information-Flow Control for Building Security and Privacy Preserving Hybrid Clouds," IEEE, pp. 1410-1417, 2016.
 P. More and D G Harkut, "Cloud Data Security using Attribute-based Key Aggregate Cryptosystem," IEEE, pp. 855-861, 2016.
 D. Singh and Harsh K Verma, "A New Framework for Cloud Storage Confidentiality to Ensure Information Security," IEEE, 2016.
 Kunal V. Raipurkar and Anil V. Deorankar , "Improve Data Security in Cloud Environment by using LDAP and Two Way Encryption Algorithm," IEEE, 2016.
 S. Sengar and . R. K. Chakrawarti , "Implementation of PDS System with Improved Security and Transparency under Cloud Environment," IEEE, 2016.
 A. Albugmi, M. O. Alassafi , . R. Walters and Gary Wills, "Data Security in Cloud Computing," IEEE, pp. 55-59, 2016.
 A. Singh and M. Malhotra , "Hybrid Two-Tier Framework for Improved Security in Cloud Environment," IEEE, pp. 955-960, 2016.
 Bin Feng, Xinzhu Ma, Cheng Guo, Hui Shi, Zhangjie Fu and Tie Qiu, "An Efï¬cient Protocol with Bidirectional Veriï¬cation for Storage Security in Cloud Computing," IEEE, pp. 1-13, 2016.
 Mrinal Kanti Sarkar and S. Kumar, "A Framework to Ensure Data Storage Security in Cloud Computing," IEEE, 2016.
 N.Thillaiarasu and ChenthurPandian.S, "Enforcing Security and Privacy over Multi â€“ Cloud Framework Using Assessment Techniques," IEEE, 2016.
 R. R. Gupta, G. Mishra, S. Katara, A. Agarwal, M. K. Sarkar, R. Das and S. Kumar, "Data Storage Security in Cloud Computing Using Container Clustering," IEEE, 2016.
 S.Petcy Carolin and M.Somasundaram, "Data Loss Protection And Data Security Using Agents For Cloud Environment," IEEE, pp. 1-5, 2016.
 T. Mavroeidakos, A. Michalas and Dimitrios D. Vergados , "Security Architecture based on Defense in Depth for Cloud Computing Environment," IEEE, 2016.
 Deepak H. Sharma, C A. Dhote and Manish M. Potey, "Intelligent Transparent Encryption-Decryption as Security-as-a-Service from Clouds," IEEE, pp. 359-362, 2016.
 Deepak H. Sharma, C A. Dhote and Manish M. Potey, "Implementing Intrusion Management as SecurityÂ¬as-a-Service from Cloud," IEEE, pp. 363-366, 2016.
 K. V. Raipurkar and A. V. Deorankar, "Improve Data Security in Cloud Environment by using LDAP and Two Way Encryption Algorithm," Symposium on Colossal Data Analysis and Networking (CDAN), IEEE, 2016.
Authors retain the copyright of their manuscripts, and all Open Access articles are distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided that the original work is properly cited.
The use of general descriptive names, trade names, trademarks, and so forth in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations. The submitting author is responsible for securing any permissions needed for the reuse of copyrighted materials included in the manuscript.
While the advice and information in this journal are believed to be true and accurate on the date of its going to press, neither the authors, the editors, nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein.