Two Factor Authentication Using M-Pin Server for Secure Cloud Computing Environment

2016 ◽  
pp. 1053-1066 ◽  
Author(s):  
Nitin Nagar ◽  
Ugrasen Suman

Cloud computing is comprised of major demand from the every group of organization because of easy availability and cost effectiveness. The responsibilities of cloud service providers will become increasing more due to the great progression in every cloud computing deployment model (public, private and hybrid) and service models (SaaS, PaaS and IaaS). In this perspective, cloud computing faces multiple challenges, especially in cloud computing security at all levels (e.g., host, network, application and data levels). Authentication is the constantly the biggest concerned for IT industries to adopt cloud computing environment. The availability, performance, key logger attack, malicious insiders, outsider attacks and service disruptions explore (service hijacking) issues are the key research challenges in the cloud computing authentication level. In this aspect, traditional user name and password is not enough as a single factor (first factor). This paper has proposed a secure cloud computing framework which uses first factor as a crypt user name and password with the ATM pin as a second factor called M-pin. The proposed work focuses on a solution to the threats that are the major issues in the cloud adoption.

2014 ◽  
Vol 4 (4) ◽  
pp. 42-54 ◽  
Author(s):  
Nitin Nagar ◽  
Ugrasen Suman

Cloud computing is comprised of major demand from the every group of organization because of easy availability and cost effectiveness. The responsibilities of cloud service providers will become increasing more due to the great progression in every cloud computing deployment model (public, private and hybrid) and service models (SaaS, PaaS and IaaS). In this perspective, cloud computing faces multiple challenges, especially in cloud computing security at all levels (e.g., host, network, application and data levels). Authentication is the constantly the biggest concerned for IT industries to adopt cloud computing environment. The availability, performance, key logger attack, malicious insiders, outsider attacks and service disruptions explore (service hijacking) issues are the key research challenges in the cloud computing authentication level. In this aspect, traditional user name and password is not enough as a single factor (first factor). This paper has proposed a secure cloud computing framework which uses first factor as a crypt user name and password with the ATM pin as a second factor called M-pin. The proposed work focuses on a solution to the threats that are the major issues in the cloud adoption.


2013 ◽  
Vol 347-350 ◽  
pp. 3312-3316
Author(s):  
Hong Jun Chen ◽  
Xue Qin Wu

The positive factors of the cloud computing: the great commercial value, the cheap and convenient use, has been recognized widely. But there are many risks on security. These security risks will greatly restrict the development of cloud computing. Cloud security risks such as: the cloud platform is easily vulnerable, cloud resources is easily abused, the cloud platform data is accessed by unauthorized user or the data is missing, the violations in the network is difficult to trace and survey, and the service providers replacement will affect the migration of the users data and services. So we research the virtualization technology, data backup and disaster recovery technology, encryption technology of data storage and transmission, the authentication technology of service providers and users, risk assessment, and legal constraints and safety training. Our research is strived to obtain a secure cloud computing environment.


Author(s):  
Shantanu Pal

In a cloud ecosystem, most of the data and software that users use reside on the remote server(s), which brings some new challenges for the system, especially security and privacy. At present, these security threats and attacks are the greatest concern for the service providers towards delivering a more secure cloud infrastructure. One of the major concerns is data security, implemented by the most effective means possible and the protection of stored data from unauthorized users and hackers. When considering these security issues, trust is one of the most important means to improve the system’s security and enable interoperability of current heterogeneous cloud computing platforms. The objective of this chapter is to discuss and understand the basic security and privacy challenges of a cloud computing environment as the security of cloud computing is the greatest challenge for delivering a safer cloud environment for both the service providers and the service customers. With this in mind, this chapter will introduce the risks and possible attacks in a cloud computing environment. The major goal is to specify the security risks and attacks and consider trust of cloud service users for delivering a safer and innovation business model.


2020 ◽  
Vol 11 (2) ◽  
pp. 45-55
Author(s):  
Mimi Liza Abdul Majid ◽  
Suriayati Chuprat

Cloud computing has become an important alternative for solving big data processing. Nowadays, cloud service providers usually offer users a virtual machine with various combinations of prices. As each user has different circumstances, the problem of choosing the cost-minimized combination under a deadline constraint as well as user's preference is becoming more complex. This article is concerned with the investigation of adapting a user's preference policies for scheduling real-time divisible loads in a cloud computing environment. The workload allocation approach used in this research is using Divisible Load Theory. The proposed algorithm aggregates resources into groups and optimally distributes the fractions of load to the available resources according to user's preference. The proposed algorithm was evaluated by simulation experiments and compared with the baseline approach. The result obtained from the proposed algorithm reveals that a significant reduction in computation cost can be attained when the user's preferences are low priority.


Author(s):  
Yuan Zheng ◽  
Xiangbin Wen

With the continuous innovation and development of modern computer science and mobile Internet and other information technologies, artificial intelligence (AI) is not a new thing. It has been widely studied and applied in many fields, and it is very important for people in modern society. The research fields of artificial intelligence mainly include: deep learning, natural language processing, computer vision, intelligent robot, automatic programming, data mining and so on. All kinds of industrial production and daily life will bring a very important practical significance and far-reaching influence. The rapid development and improvement of AI have effectively changed the daily life of modern people and improved work efficiency, and promoted the vigorous and healthy development of human economic and social civilization and the progress of information technology. When widely used, traditional network information and big data processing technologies are difficult to adapt to its development needs. Only by closely combining cloud computing technology with other technologies can it play a better role and give full play to AI technology and its development. The enthusiasm and promotion of related application technologies have promoted the smooth progress of AI technology and related undertakings. With the development and improvement of cloud computing technology, more and more users tend to use the cloud to work. However, a large number of cloud service failures occurred, causing huge losses for enterprises and individuals. In order to prevent damage to the interests of enterprises and individuals, cloud service providers will provide high-quality services as much as possible. This paper aims to study the application of AI technology in cloud computing environment resources, research on the indicator of reliability, and propose a cloud service reliability verification method for the infrastructure-as-a-service layer. Experimental research shows that through the reliability detection method in this paper, users can easily and quickly obtain the reliability of the purchased cloud service, and can intuitively feel whether the performance of each server meets the promised situation in the cloud service provider’s SLA.


Author(s):  
Afaf Edinat ◽  
Rizik M. H. Al-Sayyed ◽  
Amjad Hudaib

Cloud computing is considered one of the most important techniques in the field of distributed computing which contributes to maintain increased scalability and flexibility in computer processing. This is achieved because it, using the Internet, provides different resources and shared services with minimum costs. Cloud service providers (CSPs) offer many different services to their customers, where the customers’ needs are met seeking the highest levels of quality at the lowest considerate prices. The relationship between CSPs and customers must be determined in a formal agreement, and to ensure how the QoS between them will be fulfilled, a clear Service Level Agreement (SLA) must be called for. Several previously-proposed models used in the literature to improve the QoS in the SLA for cloud computing and to face many of the challenges in the SLA are reviewed in this paper. We also addressed the challenges that are related to the violations of SLAs, and how overcoming them will enhance customers’ satisfaction. Furthermore, we proposed a model based on Deep Reinforcement Learning (DRL) and an enhanced DRL agent (EDRLA). In this model, and by optimizing the learning process in EDRLA, proposed agents would be able to have optimal CSPs by improving the learning process in EDRLA. This improvement will be reflected in the agent's performance and considerably affect it, especially in identifying cloud computing requirements based on the QoS metrics.


Author(s):  
Prasanta K. Manohari ◽  
Niranjan K. Ray

Cloud computing is one of the emerging technology in the recent times which has varieties of applications at different fields. It is an Internet dependent technology and it store and maintain the data in a cloud data center. Cloud center usually supports more numbers of user, applications and data. In the same time, it also suffered with numerous challenges. Security is a key requirement for cloud data center. Different security mechanisms are proposed for cloud computing environment. In this chapter, we address the background of cloud computing, security risk, requirements, issues, and some of the security techniques are discussed. We discuss different security issues and focus on some existing solutions.


2013 ◽  
Vol 3 (1) ◽  
pp. 44-57 ◽  
Author(s):  
Veena Goswami ◽  
Choudhury Nishkanta Sahoo

Cloud computing has emerged as a new paradigm for accessing distributed computing resources such as infrastructure, hardware platform, and software applications on-demand over the internet as services. This paper presents an optimal resource management framework for multi-cloud computing environment. The authors model the behavior and performance of applications to integrate different service-providers for end-to-end-requirements. Each service model caters to specific type of requirements and there are already number of players with own customized products/services offered. Intercloud Federation and Service delegation models are part of Multi-Cloud environment where the broader target is to achieve infinite pool of resources. They propose an analytical queueing network model to improve the efficiency of the system. Numerical results indicate that the proposed provisioning technique detects changes in arrival pattern, resource demands that occur over time and allocates multiple virtualized IT resources accordingly to achieve application Quality of Service targets.


2019 ◽  
Vol 8 (S1) ◽  
pp. 80-83
Author(s):  
J. VimalRosy ◽  
S. Britto Ramesh Kumar

Day by day witnesses a wide development of information technology in the use of cloud computing, and its services shape its architecture. It is indeed, that replaces the former attempts to enrich the security strategy in cloud computing. Security is one of the major issues in the cloud computing environment. In this paper we investigate about security threads and possible solution for cloud. The paper is categorized as follows: Section I describes the cloud computing overview. Section II describes the security threats and challenges in cloud computing. Section III describes the Obstacles and vulnerabilities that can be carried out to cloud environments. Section IV describes the possible solution of the issues. Section V concludes the paper with a cloud computing security.


Sign in / Sign up

Export Citation Format

Share Document