Submit your paper : editorIJETjournal@gmail.com Paper Title : Eradication Of Phishing Attacks On Cloud Using Two Factor Authentication ISSN : 2395-1303 Year of Publication : 2020 10.29126/23951303/IJET-V6I2P14 MLA Style: M.AZHAGIRI, G.LEELA, K.NIKESH, CH.PRASAD Eradication Of Phishing Attacks On Cloud Using Two Factor Authentication " Volume 6 - Issue 2(1-6) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org APA Style: M.AZHAGIRI, G.LEELA, K.NIKESH, CH.PRASAD Eradication Of Phishing Attacks On Cloud Using Two Factor Authentication " Volume 6 - Issue 2(1-6) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org Abstract Phishing has been a superb threat to Cloud for an extended time; many data stored within the cloud are often theft by Phishing outbreaks. Leaking of knowledge damages the persons/institutions' value, prestige, and loss of money. The target of our paper is to beat the Phishing outbreaks. Phishing is often solved using Two-Factor Authentication (2FA). During this method, we use a password and an OTP for login. An algorithm called Time based One-Time Password (TOTP) is used to provide an OTP. This may be utilized in Banking and Financial Services. So, we are using this method we generate an OTP whenever a user tries to log in to his account. By entering the OTP and password only he can log in to his account. These help in reducing the threat of Phishing since knowing the password alone isn't sufficient for our breakers to log in to our account. This way we'll eradicate the Phishing Outbreaks on Banking and Financial sites by 80%. This algorithm is best utilized in conditions like Banking, Financial and online shopping websites. Reference 1. Nabil Sultan, "Disseminated processing for preparing", IJIM, 2010. 2. Tianyang Li, "LARX: Large-scale Anti-phishing by Retrospective Data-Exploring Based on a Cloud Computing Platform", IEEE, 2011. 3. Hassan Takabi, "Security and Privacy Challenges in Cloud Computing Environments", IEEE, 2010. 4. Lori Kaufman, "Data Security in the World of Cloud Computing", IEEE, 2009. 5. Dimitrios Zissis, "Tending to disseminated registering security issues", Future Generation Computer Systems, 2012. 6. Jothipriya, "Conveyed registering Security Issues, Technologies and Challenges", ESIJ volume 3, Issue 2, 2016. 7. Liliana, "Security Issues in Cloud Environments", IJIS, 2013. 8. KalaichelviChandrahasan, "Investigation Challenges and Security Issues in Cloud Computing", IJCIIS vol.3, No.3, 2012. Keywords Phishing, Two Factor Authentication, Time based One-Time Password, Banking sector, Online shopping websites, Data theft. |