Creating and sharing knowledge for telecommunications

Two factor encryption in cloud storage providers using Hardware Tokens

Crocker, P. ; Querido, PQ

Two factor encryption in cloud storage providers using Hardware Tokens, Proc IEEE GLOBECOM 2015 Workshop on Cloud Computing Systems, Networks, and Applications GLOBECOM 2015 CCSNA, San-Diego, United States, Vol. -, pp. - - -, December, 2015.

Digital Object Identifier:

Clouds are widely used for storing, backing up and sharing information. Data confidentiality and privacy issues are important and topical issues in the evolving cloud technology. In this paper we describe a system that addresses the issues of securely accessing and storing data in cloud repositories. This paper will describe a two factor encryption architecture for cloud storage that incorporates the use of a hardware token. We have validated experimentally this architecture by developing a middleware that can be used with any cloud storage provider that makes use of the OAuth 2.0 protocol for authentication and authorization. The middleware enables the use of two-factor authentication and encryption mechanisms to ensure the privacy of the data, in this paper the YubiKey USB cryptographic token is used as the external two-factor module