Aims and Background: Accessing data services on the cloud raises serious concerns about security and privacy. To verify a client's stated identity, the existing authentication approach uses just one authentication factor. However, traditional techniques of one-factor authentication are inefficient since they demand an excessive amount of user information and expose their private data to eavesdropping. Methods: Cloud-based data storage is susceptible to both external and internal threats. Information security relies heavily on authentication, which is a method for verifying user identities before granting them access to protected data. When it comes to protecting data in a cloud computing environment from the most cutting-edge methods of attack, traditional password authentication simply isn't enough. For the purpose of protecting user identities in the cloud, this study presents interactive multi-layer authentication systems. Various access control policies are used when validating users in the cloud. Registration, permissions, and authentication factors for users are all parts of the cloud app's security process. Results: An intrusion detection system is built into the security mechanism to help identify people who could be malevolent. Various techniques are available for user identity verification, including intrusion detection, access control, and multi-factor authentication. The last step is to encrypt the data so that no one else can read it. Conclusion: To guarantee the effectiveness and accuracy of the suggested frameworks and methodology, they are experimentally evaluated. There were few false positives and a high detection rate.
Read full abstract