Data Security in Cloud Computing using Three Way Mechanism
A.Vijayaraj1, Irene John Ukken2, Karunya.S3, Sathish Raj.G4

1Dr.A.Vijayaraj*, Associate Professor, Department of Information Technology, Sri Shakthi Institute of Engineering and Technology, Coimbatore. Tamilnadu, India India.
2Irene John Ukken, Department of Information Technology, Sri Shakthi Institute of Engineering and Technology, Coimbatore, Tamilnadu.
3Karunya.S, Department of Information Technology, Sri Shakthi Institute of Engineering and Technology, Coimbatore, Tamilnadu.
4Sathish Raj.G, Department of Information Technology, Sri Shakthi Institute of Engineering and Technology, Coimbatore, Tamilnadu.

Manuscript received on March 30, 2020. | Revised Manuscript received on April 05, 2020. | Manuscript published on April 30, 2020. | PP: 1312-1316 | Volume-9 Issue-4, April 2020. | Retrieval Number: D8312049420/2020©BEIESP | DOI: 10.35940/ijeat.D8312.049420
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing is the front line innovation of the decennium. It empowers users to store enormous collection of information in distributed storage and make use of it as and when they please from any corner of the world, with any sorts of hardware. As this distributive computing is reliant on the internet facility, issues of security like privacy, security of information, authentication and data confidentiality is experienced. So as to dispose of these issues, an assortment of encryption calculations and systems are utilized. Numerous specialists pick what they discovered best and made use of these in different blends to give the security to the information in cloud. Going through a comparable circumstance, we have decided to utilize a mix of validation system and key trade calculation mixed with an encryption calculation. The blend is alluded to as a “Three way mechanism” since it guarantees all three of confirmation, information protection and inspection insurance policies. In this paper, we have proposed to utilize two-factor authentication mixed in (AES) Advanced Encryption Standard encryption calculation that secures the secrecy of information put away within cloud. Without user’s private key that is special to the user, even if the key that is moving is stolen or hijacked the feature of key exchange renders it pointless and is of no use. The given proposed engineering of three way mechanism making it tedious for unauthorized personnel to break this security framework, therefore securing information put away in cloud.
Keywords: Cloud computing, Two-factor authentication, Three way mechanism, AES Encryption, Data confidentiality.