State space classification of Markov password – an alphanumeric password authentication scheme for secure communication in cloud computing

Author(s):  
S. Vaithyasubramanian S. Vaithyasubramanian ◽  
R. Sundararajan

Purpose Purpose of this study is to classify the states of Markov Chain for the implementation of Markov Password for effective security. Password confirmation is more often required in all authentication process, as the usage of computing facilities and electronic devices have developed hugely to access networks. Over the years with the increase in numerous Web developments and internet applications, each platform needs ID and password validation for individual users. Design/methodology/approach In the technological development of cloud computing, in recent times, it is facing security issues. Data theft, data security, denial of service, patch management, encryption management, key management, storage security and authentication are some of the issues and challenges in cloud computing. Validation in user login authentications is generally processed and executed by password. To authenticate universally, alphanumeric passwords are used. One of the promising proposed methodologies in this type of password authentication is Markov password. Markov passwords – a rule-based password formation are created or generated by using Markov chain. Representation of Markov password formation can be done by state space diagram or transition probability matrix. State space classification of Markov chain is one of the basic and significant properties. The objective of this paper is to classify the states of Markov chain to support the practice of this type of password in the direction of effective authentication for secure communication in cloud computing. Conversion of some sample obvious password into Markov password and comparative analysis on their strength is also presented in this paper. Analysis on strength of obvious password of length eight has shown range of 7%–9% although the converted Markov password has shown more than 82%. As an effective methodology, this password authentication can be implemented in cloud portal and password login validation process. Findings The objective of this paper is to classify the states of Markov chain to support the practice of this type of password in the direction of effective authentication for secure communication in cloud computing. Conversion of some sample obvious password into Markov password and comparative analysis on their strength is also presented in this paper. Originality/value Validation in user login authentications is generally processed and executed by password. To authenticate universally, alphanumeric passwords are used. One of the promising proposed methodologies in this type of password authentication is Markov password.

2017 ◽  
Vol 2 (3) ◽  
pp. 1
Author(s):  
Hanane Bennasar ◽  
Mohammad Essaaidi ◽  
Ahmed Bendahmane ◽  
Jalel Benothmane

Cloud computing cyber security is a subject that has been in top flight for a long period and even in near future. However, cloud computing permit to stock up a huge number of data in the cloud stockage, and allow the user to pay per utilization from anywhere via any terminal equipment. Among the major issues related to Cloud Computing security, we can mention data security, denial of service attacks, confidentiality, availability, and data integrity. This paper is dedicated to a taxonomic classification study of cloud computing cyber-security. With the main objective to identify the main challenges and issues in this field, the different approaches and solutions proposed to address them and the open problems that need to be addressed.


Author(s):  
Gopal Singh Kushwah ◽  
Virender Ranga

Cloud computing has now become a part of many businesses. It provides on-demand resources to its users based on pay-as-you-use policy, across the globe. The high availability feature of this technology is affected by distributed denial of service (DDoS) attack, which is a major security issue. In this attack, cloud or network resources are exhausted, resulting in a denial of service for legitimate users. In this chapter, a classification of various types of DDoS attacks has been presented, and techniques for defending these attacks in cloud computing have been discussed. A discussion on challenges and open issues in this area is also given. Finally, a conceptual model based on extreme learning machine has been proposed to defend these attacks.


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Juan Manuel Maqueira Marín ◽  
Diessica De Oliveira-Dias ◽  
Nima Jafari Navimipour ◽  
Bhaskar Gardas ◽  
Mehmet Unal

PurposeThis study aims to provide an overview of what characterizes the current state of research in the field of cloud computing use in human resource management (HRM) with the identification, analysis and classification of the existing literature and lines of research addressed and to provide guidance for future research.Design/methodology/approachThe systematic literature review (SLR) technique has been used to identify, select, analyze and evaluate the existing publications on cloud computing and HRM. A total of 35 papers published up to December 2020 have been obtained from the Web of Science (WoS) scientific database. The research design has allowed us to determine what characterizes the current state of research on the use of cloud computing in HRM and obtain a novel classification of the literature that identifies four lines of research and the contributions in each line and has allowed us to define the future research agenda.FindingsThe four groups into which the papers on the cloud computing-HRM relationship have been classified are: (1) studies focused on the development of cloud platforms for HRM that highlight technical aspects, (2) papers that focus on the concept of human resource elasticity, (3) papers on the adoption and/or implantation of cloud platforms for HRM and (4) studies that highlight the effects or implications of cloud platforms for HRM. This paper proposes some new opportunities for future research and presents some helpful implications from the theoretical and management perspectives.Research limitations/implicationsThis study uses only scientific articles in the WoS database with a Journal Citation Report (JCR) or SCImago Journal Rank (SJR) impact.Originality/valueThis paper provides an overview of the knowledge on cloud computing and HRM research and offers recommendations for future research.


1989 ◽  
Vol 26 (4) ◽  
pp. 757-766 ◽  
Author(s):  
Ram Lal ◽  
U. Narayan Bhat

In a correlated random walk (CRW) the probabilities of movement in the positive and negative direction are given by the transition probabilities of a Markov chain. The walk can be represented as a Markov chain if we use a bivariate state space, with the location of the particle and the direction of movement as the two variables. In this paper we derive explicit results for the following characteristics of the walk directly from its transition probability matrix: (i) n -step transition probabilities for the unrestricted CRW, (ii) equilibrium distribution for the CRW restricted on one side, and (iii) equilibrium distribution and first-passage characteristics for the CRW restricted on both sides (i.e., with finite state space).


2018 ◽  
Vol 35 (6) ◽  
pp. 1268-1288 ◽  
Author(s):  
Kong Fah Tee ◽  
Ejiroghene Ekpiwhre ◽  
Zhang Yi

PurposeAutomated condition surveys have been recently introduced for condition assessment of highway infrastructures worldwide. Accurate predictions of the current state, median life (ML) and future state of highway infrastructures are crucial for developing appropriate inspection and maintenance strategies for newly created as well as existing aging highway infrastructures. The paper aims to discuss these issues.Design/methodology/approachThis paper proposes Markov Chain based deterioration modelling using a linear transition probability (LTP) matrix method and a median life expectancy (MLE) algorithm. The proposed method is applied and evaluated using condition improvement between the two successive inspections from the Surface Condition Assessment of National Network of Roads survey of the UK Pavement Management System.FindingsThe proposed LTP matrix model utilises better insight than the generic or decoupling linear approach used in estimating transition probabilities formulated in the past. The simulated LTP predicted conditions are portrayed in a deterioration profile and a pairwise correlation. The MLs are computed statistically with a cumulative distribution function plot.Originality/valueThe paper concludes that MLE is ideal for projecting half asset life, and the LTP matrix approach presents a feasible approach for new maintenance regime when more certain deterioration data become available.


1989 ◽  
Vol 26 (04) ◽  
pp. 757-766 ◽  
Author(s):  
Ram Lal ◽  
U. Narayan Bhat

In a correlated random walk (CRW) the probabilities of movement in the positive and negative direction are given by the transition probabilities of a Markov chain. The walk can be represented as a Markov chain if we use a bivariate state space, with the location of the particle and the direction of movement as the two variables. In this paper we derive explicit results for the following characteristics of the walk directly from its transition probability matrix: (i) n -step transition probabilities for the unrestricted CRW, (ii) equilibrium distribution for the CRW restricted on one side, and (iii) equilibrium distribution and first-passage characteristics for the CRW restricted on both sides (i.e., with finite state space).


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Luca Ferri ◽  
Rosanna Spanò ◽  
Marco Maffei ◽  
Clelia Fiondella

PurposeThis paper aims to investigate the factors influencing chief executive officers’ (CEOs') intentions to implement cloud technology in Italian small and medium-sized enterprises (SMEs).Design/methodology/approachThe study proposes a model that integrates the theoretical construct of the technology acceptance model (TAM) with a classification of perceived benefits and risks related to cloud computing. The study employs a structural equation modeling approach to analyze data gathered through a Likert scale-based survey.FindingsThe findings indicate that risk perception has a strong negative effect on the intention to introduce cloud technology in firms. This effect is partially offset by the perceived ease of use of the technology.Originality/valueThe study provides a new theoretical framework that integrates the TAM and a classification of perceived risks to provide a clear view of management's cognitive processes during technological change. Moreover, the results show the main factors influencing decisions regarding the implementation of cloud computing in firms in light of the perception of risks. Finally, this study provides interesting findings for cloud service providers (CSPs) about their customers' decision-making processes.


1968 ◽  
Vol 5 (01) ◽  
pp. 220-223 ◽  
Author(s):  
Barry C. Arnold

Let {X(n): n = 0, 1, 2, …} be a Markov chain with state space {0, 1, 2, …, N} and transition probability matrix P = (pij ).


2016 ◽  
Vol 14 (4) ◽  
pp. 334-349 ◽  
Author(s):  
Lisardo Prieto González ◽  
Corvin Jaedicke ◽  
Johannes Schubert ◽  
Vladimir Stantchev

Purpose The purpose of this study is to analyze how embedding of self-powered wireless sensors into cloud computing further enables such a system to become a sustainable part of work environment. Design/methodology/approach This is exemplified by an application scenario in healthcare that was developed in the context of the OpSIT project in Germany. A clearly outlined three-layer architecture, in the sense of Internet of Things, is presented. It provides the basis for integrating a broad range of sensors into smart healthcare infrastructure. More specifically, by making use of short-range communication sensors (sensing layer), gateways which implement data transmission and low-level computation (fog layer) and cloud computing for processing the data (application layer). Findings A technical in-depth analysis of the first two layers of the infrastructure is given to prove reliability and to determine the communication quality and availability in real-world scenarios. Furthermore, two example use-cases that directly apply to a healthcare environment are examined, concluding with the feasibility of the presented approach. Practical implications Finally, the next research steps, oriented towards the semantic tagging and classification of data received from sensors, and the usage of advanced artificial intelligence-based algorithms on this information to produce useful knowledge, are described together with the derived social benefits. Originality/value The work presents an innovative, extensible and scalable system, proven to be useful in healthcare environments.


Sign in / Sign up

Export Citation Format

Share Document