AVANTHI INSTITUTE OF ENGINEERING AND TECHNOLOGY
(Approved by AICTE,New Delhi,Recg. By Govt. of T.S& Affiliated to JNTUH, Hyderabad)
NAAC “A” Accredited Institute
Gunthapally(V), Abdullapurmet (M), RR Dist, Near Ramoji Film City, Hyderabad -501512.
[Link] Email: [Link]@[Link]
Real - Time Research Project
TITLE: MULTI-FACTOR ACCESS CONTROL FOR CLOUD DATA
SECURITY
TEAM MEMBERS: ATTLURI SATYA SRI - 21Q61A0508
BYRI SANVITHA - 21Q61A0517
DESHINI NISCHALA PRIYA - 21Q61A0553
AADIREDDY KIRAN TEJA - 21Q61A0543
BHEEMANI SANTHOSH SHYAM - 21Q61A0511
GUIDE NAME: Dr. N. V. RAMANA REDDY
ASSOCIATE PROFESSOR
ABSTRACT
Traditional single-factor authentication mechanisms have proven insufficient in
mitigating sophisticated security threats such as unauthorized access, credential
theft, and insider attacks.
It provides services in an open network, it is urgent for service providers to make use
of secure data storage and sharing mechanism to ensure data confidentiality and
service user privacy.
To protect sensitive data from being compromised, the most widely used method is encryption.
It combines password-based authentication, One-Time Passwords (OTP) and
biometric verification (e.g., fingerprint or facial recognition) to establish a robust
access control framework.
The device recognition and user behavior patterns are incorporated to provide adaptive security.
The solution is developed as a working prototype using cloud platforms such as
AWS and Firebase, leveraging secure APIs and authentication services for real-time
user validation.
EXISTING SYSTEM
In traditional cloud data security systems, access control is often implemented using
single-factor authentication methods, primarily relying on a combination of username and
password.
While easy to implement, this approach is highly vulnerable to common threats such as
brute-force attacks, phishing, and credential reuse.
Another
roles with commonly used method is Role-Based Access Control (RBAC), where users are assigned
predefined permissions.
DRAWBACKS OF EXISTING SYSTEM
Password can be reused and the hacker can mismatch the data.
During the encryption and decryption the data can be manipulated.
PROPOSED SYSTEM
The proposed system introduces a robust and intelligent access control mechanism for
enhancing cloud data security by integrating multi-factor authentication (MFA) with context-
aware access control.
Unlike traditional single-factor or role-based models, this system ensures that users must verify
their identity through multiple factors—such as a password, a one-time password (OTP) sent
via email or an authenticator app, and optionally biometric data like fingerprints and also
provides the authority key.
ADVANTAGES OF PROPOSING SYSTEM
Combining multiple factors (MFA) and context makes unauthorized access
significantly harder. It handles the dynamic access control to prevent access from
unknown locations or devices.
SYSTEM REQUIREMENTS
HARDWARE SYSTEM CONFIGURATION
❖ System : i5
❖ Hard Disk : 20 GB
❖ Ram : 1 GB
SOFTWARE REQUIREMENTS
❖ Technology : JAVA 8.1
❖ Web Server : Apache tomcat
❖ Client Side Technologies : HTML, CSS, JavaScript
❖ Data Base Server : MySQL
❖ Design & Module : Rational Rose
SYSTEM ARCHITECTURE
DATA FLOW DIAGRAM LEVEL 0
DATA FLOW DIAGRAM LEVEL 1
USE CASE DIAGRAM
SEQUENCE DIAGRAM
Conclusion
Multi -Factor Access Control For Cloud Data Security which provides the
extra layer of security for the data from the attackers by giving the MSK
(Master Key) which is the main part for user to get the data from the cloud.
Thank Q.