scholarly journals Engineering Authentication Process with Cloud Computing

Author(s):  
G. Nivedhitha ◽  
R. Ilakkiya

Cloud computing is a way to increase the capacity or add capabilities dynamically without any upfront investments. Despite the growth achieved from the cloud computing, security is still questionable which impacts the cloud model adoption. Aside of having network and application securities being adopted, there must be a security that authenticate the user when accessing the cloud services that is bound to the rules between the cloud computing provider and the client side. The existing system provides authentication based on keys Encryption algorithms either symmetric key-based or asymmetric are key-based. Both encryption approaches have a major problem related to encryption key management i.e. how to securely generate, store, access and exchange secrete keys. In this paper, an optimized infrastructure for secure authentication and authorization in Cloud Environment using SSO (Single Sign-On) is proposed. SSO is a process of authenticating once and gain access of multiple resources that aims at reducing number of login and password in heterogeneous environment and to gain balance in Security, Efficiency and Usability. Also an authentication model for cloud computing based on the Kerberos protocol to provide single sign-on and to prevent against DDOS attacks is also presented in this paper.

2015 ◽  
pp. 466-489
Author(s):  
K. Palanivel ◽  
S. Kuppuswami

Cloud computing is an emerging computing model which has evolved as a result of the maturity of underlying prerequisite technologies. There are differences in perspective as to when a set of underlying technologies becomes a “cloud” model. In order to categorize cloud computing services, and to expect some level of consistent characteristics to be associated with the services, cloud adopters need a consistent frame of reference. The Cloud Computing Reference Architecture (CCRA) defines a standard reference architecture and consistent frame of reference for comparing cloud services from different service providers when selecting and deploying cloud services to support their mission requirements. Cloud computing offers information retrieval systems, particularly digital libraries and search engines, a wide variety of options for growth and reduction of maintenance needs and encourages efficient resource use. These features are particularly attractive for digital libraries, repositories, and search engines. The dynamic and elastic provisioning features of a cloud infrastructure allow rapid growth in collection size and support a larger user base, while reducing management issues. Hence, the objective of this chapter is to investigate and design reference architecture to Digital Library Systems using cloud computing with scalability in mind. The proposed reference architecture is called as CORADLS. This architecture accelerates the rate at which library users can get easy, efficient, faster and reliable services in the digital environment. Here, the end user does not have to worry about the resource or disk space in cloud computing.


2020 ◽  
Vol 1 (2) ◽  
pp. 127
Author(s):  
Indra Gita Anugrah ◽  
Muhamad Aldi Rifai Imam Fakhruddin

The security of an application is the most important problem in an information system integration process. The authentication and authorization process is usually carried out using Single Sign On (SSO). Authentication and authorization methods are used to secure data in a system. The authentication and authorization processes are carried out on the client side (web browser) in the form of a session and on the server side (web server) in the form of cookies. Sessions and cookies are valuable assets in the authentication and authorization process because they contain the data required for the login process so that the session and cookies need to be secured. Session is a combination of username and password data that has been encrypted while cookies store login information data so that they are still in a state of gaining access according to the privileges given to the user. So important is the role of sessions and cookies in the authentication and authorization process, so we need a way to secure data on sessions and cookies. One way to secure data is to use the REst API and Auth Token.


Author(s):  
K. Palanivel ◽  
S. Kuppuswami

Cloud computing is an emerging computing model which has evolved as a result of the maturity of underlying prerequisite technologies. There are differences in perspective as to when a set of underlying technologies becomes a “cloud” model. In order to categorize cloud computing services, and to expect some level of consistent characteristics to be associated with the services, cloud adopters need a consistent frame of reference. The Cloud Computing Reference Architecture (CCRA) defines a standard reference architecture and consistent frame of reference for comparing cloud services from different service providers when selecting and deploying cloud services to support their mission requirements. Cloud computing offers information retrieval systems, particularly digital libraries and search engines, a wide variety of options for growth and reduction of maintenance needs and encourages efficient resource use. These features are particularly attractive for digital libraries, repositories, and search engines. The dynamic and elastic provisioning features of a cloud infrastructure allow rapid growth in collection size and support a larger user base, while reducing management issues. Hence, the objective of this chapter is to investigate and design reference architecture to Digital Library Systems using cloud computing with scalability in mind. The proposed reference architecture is called as CORADLS. This architecture accelerates the rate at which library users can get easy, efficient, faster and reliable services in the digital environment. Here, the end user does not have to worry about the resource or disk space in cloud computing.


Author(s):  
M. Chinnadurai ◽  
A. Jayashri

Cloud computing is one of the important factoring that leads it into a productive phase. This means that most of the main problems with cloud computing have been addressed to a degree that clouds have become interesting for full commercial exploitation. However, permissions over data security still prevent many users from migrating data to remote storage. Client-side data compression in particular ensures that multiple uploads of the same content only consume network bandwidth and storage space of a single upload. Compression is actively used by a number of cloud backup providers as well as various cloud services. Unfortunately, encrypted data is pseudorandom and thus cannot be deduplicated: as a consequence, current schemes have to entirely sacrifice either security or storage efficiency. In this system, present a scheme that permits a more fine-grained trade-off. The intuition is that outsourced data may require different levels of protection, depending on how popular it is: content shared by many users. Then present a novel idea that differentiates data according to their popularity. In this proposed system, implement an encryption scheme that guarantees semantic security for unpopular data and provides weaker security and better storage and bandwidth benefits for popular data. Proposed data de-duplication can be effective for popular data, also semantically secure encryption protects unpopular content. Finally, can use the backup recover system at the time of blocking and also analyze frequent login access system.


2013 ◽  
Vol 846-847 ◽  
pp. 1640-1643 ◽  
Author(s):  
Da Wei Xu ◽  
Cun Jiang Yu

In this paper, a novel Automatic Malware Signature Discovery System for AV cloud is proposed to generate malware signatures from both static and dynamic aspects. It keeps a good workload balance between the desktop and cloud services. It can automatically generate a lightweight signature database with the size hundreds times smaller than traditional signature ones. In the AV cloud model, users do not need to install a large virus signature file, but a lightweight set of cloud signatures. The benefits include easy deployment, low costs of operation, and fast signature updating. Further, Automatic Malware Signature Discovery System signatures can be easily integrated into existing AV products.


Cloud Computing is a paradigm of distributed computing that delivers on-demand and utility-based services to its customers. It provides a set of shared computing resources such as networking, servers, storage, and applications in the form of services to an organization or an individual. The major benefits of cloud computing include on-demand self-service and cost-effectiveness. For the customer, there is no up-front cost for setting up and running the applications on the cloud. Despite the benefits provided by various cloud services, the outsourcing of data storage and computation raise many new security issues. One of such security issues that have to be addressed before uploading our sensitive data to the cloud is data privacy. With the cloud model, end-users lose control over the physical location of data, because data will be stored and processed elsewhere on the globe and not in the local computer. Hence, we need an algorithm for encrypting the data that can be stored and retrieved from a database managed by the public cloud.


Author(s):  
Amar Buchade ◽  
Rajesh Ingle

<p>In cloud computing, immediate access of resources is important due to cost incurred to customer by pay per use model of cloud computing. Usually resource is protected by using cryptography technique. The resource may be shared by multiple members in group. There can be overlapping members to access the multiple resources. Group key management is important to form the group key to access the resource. Group key formation time is crucial for immediate access of protected resource in cloud computing. Thus ternary tree based approach is proposed to form the key for overlapping members accessing resources. Membership event such as join and leave also considered. Through the analysis, it is found that computational overhead is reduced by 23% if ternary key trees are combined than independent ternary key trees. It is also observed that combined ternary key tree outperforms the combined binary key tree approach for group key formation by considering overlapping members. Security requirement analysis of group membership for key formation is also provided in the paper.</p>


2018 ◽  
Vol 31 (1) ◽  
pp. 244
Author(s):  
Nada M. Al-Hakkak ◽  
Ban Salman Shukur ◽  
Atheel Sabih Shaker

   The concept of implementing e-government systems is growing widely all around the world and becoming an interest to all governments. However, governments are still seeking for effective ways to implement e-government systems properly and successfully. As services of e-government increased and citizens’ demands expand, the e-government systems become more costly to satisfy the growing needs. The cloud computing is a technique that has been discussed lately as a solution to overcome some problems that an e-government implementation or expansion is going through. This paper is a proposal of a  new model for e-government on basis of cloud computing. E-Government Public Cloud Model EGPCM, for e-government is related to public cloud computing.


Sign in / Sign up

Export Citation Format

Share Document