Submit your paper : editorIJETjournal@gmail.com
Paper Title : Eradication Of Phishing Attacks On Cloud Using Two Factor Authentication
ISSN : 2395-1303
Year of Publication : 2020
MLA Style: M.AZHAGIRI, G.LEELA, K.NIKESH, CH.PRASAD Eradication Of Phishing Attacks On Cloud Using Two Factor Authentication " Volume 6 - Issue 2(1-6) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org
APA Style: M.AZHAGIRI, G.LEELA, K.NIKESH, CH.PRASAD Eradication Of Phishing Attacks On Cloud Using Two Factor Authentication " Volume 6 - Issue 2(1-6) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org
Phishing has been a superb threat to Cloud for an extended time; many data stored within the cloud are often theft by Phishing outbreaks. Leaking of knowledge damages the persons/institutions' value, prestige, and loss of money. The target of our paper is to beat the Phishing outbreaks. Phishing is often solved using Two-Factor Authentication (2FA). During this method, we use a password and an OTP for login. An algorithm called Time based One-Time Password (TOTP) is used to provide an OTP. This may be utilized in Banking and Financial Services. So, we are using this method we generate an OTP whenever a user tries to log in to his account. By entering the OTP and password only he can log in to his account. These help in reducing the threat of Phishing since knowing the password alone isn't sufficient for our breakers to log in to our account. This way we'll eradicate the Phishing Outbreaks on Banking and Financial sites by 80%. This algorithm is best utilized in conditions like Banking, Financial and online shopping websites.
1. Nabil Sultan, "Disseminated processing for preparing", IJIM, 2010. 2. Tianyang Li, "LARX: Large-scale Anti-phishing by Retrospective Data-Exploring Based on a Cloud Computing Platform", IEEE, 2011. 3. Hassan Takabi, "Security and Privacy Challenges in Cloud Computing Environments", IEEE, 2010. 4. Lori Kaufman, "Data Security in the World of Cloud Computing", IEEE, 2009. 5. Dimitrios Zissis, "Tending to disseminated registering security issues", Future Generation Computer Systems, 2012. 6. Jothipriya, "Conveyed registering Security Issues, Technologies and Challenges", ESIJ volume 3, Issue 2, 2016. 7. Liliana, "Security Issues in Cloud Environments", IJIS, 2013. 8. KalaichelviChandrahasan, "Investigation Challenges and Security Issues in Cloud Computing", IJCIIS vol.3, No.3, 2012.
Phishing, Two Factor Authentication, Time based One-Time Password, Banking sector, Online shopping websites, Data theft.