Multi-Layer Token Based Authentication Through Honey Password in Fog Computing

2018 ◽  
Vol 1 (1) ◽  
pp. 50-62 ◽  
Author(s):  
Praveen Kumar Rayani ◽  
Bharath Bhushan ◽  
Vaishali Ravindra Thakare

This article describes how fog computing empowers network resource utilization by providing services to low bandwidth users in cloud environment. Here, authentication mechanisms are used by fog nodes while providing services to end users. In cloud computing there are several types of authentication mechanisms, in which token based authentication takes less time for validating password. The proposed technique uses token based authentication mechanism with honey password. The aim of this article is to focus on multi-layer token based authentication for identifying the authorized user at fog node. In authentication phase end user instantaneously frame his user account password with honey password that makes illusion to shoulder surfers password has changed. The proposed mechanism avoids and detects shoulder surfing attacks, password guessing attacks, and application denial of service attacks.

10.29007/nc47 ◽  
2018 ◽  
Author(s):  
Manu Sharma

In the world of Digital Innovation “Cloud Computing” is not just a word or a technology but a paramount to the organizations now days. Because it is not easy to store, compute the data on an internet and central remote server to manage a huge bulk of data and information. It is well known that cloud computing provides data, storage of data, computation of data to the end user also by providing the services to the end users by the different applications. So, now the Fog Computing Is generally a concept to extend the cloud computing technology as it also does the same function which cloud computing functionality as well. It is not the replacement but the enhanced version of cloud which provides a security on the cloud environment by isolating user’s data which is saved on the Edge Devices. Fog Computing enables a user to save their data to nearby devices. In this paper the security issues also the technology which is used for security in this enhanced concept of cloud is mentioned.


Internet of things (IoT) is an emerging concept which aims to connect billions of devices with each other anytime regardless of their location. Sadly, these IoT devices do not have enough computing resources to process huge amount of data. Therefore, Cloud computing is relied on to provide these resources. However, cloud computing based architecture fails in applications that demand very low and predictable latency, therefore the need for fog computing which is a new paradigm that is regarded as an extension of cloud computing to provide services between end users and the cloud user. Unfortunately, Fog-IoT is confronted with various security and privacy risks and prone to several cyberattacks which is a serious challenge. The purpose of this work is to present security and privacy threats towards Fog-IoT platform and discuss the security and privacy requirements in fog computing. We then proceed to propose an Intrusion Detection System (IDS) model using Standard Deep Neural Network's Back Propagation algorithm (BPDNN) to mitigate intrusions that attack Fog-IoT platform. The experimental Dataset for the proposed model is obtained from the Canadian Institute for Cybersecurity 2017 Dataset. Each instance of the attack in the dataset is separated into separate files, which are DoS (Denial of Service), DDoS (Distributed Denial of Service), Web Attack, Brute Force FTP, Brute Force SSH, Heartbleed, Infiltration and Botnet (Bot Network) Attack. The proposed model is trained using a 3-layer BP-DNN


2020 ◽  
Vol 1 (2) ◽  
pp. 1-5
Author(s):  
Bibek Naha ◽  
Siddhartha Banerjee ◽  
Sayanti Mondal

Cloud Computing is one of the most nurtured as well as debated topic in today’s world. Billions of data of various fields ranging from personal users to large business enterprises reside in Cloud. Therefore, availability of this huge amount of data and services is of immense importance. The DOS (Denial of Service) attack is a well-known threat to the availability of data in a smaller premise. Whenever, it’s a Cloud environment this simple DOS attack takes the form of DDOS (Distributed Denial of Service) attack. This paper provides a generic insight into the various kinds of DOS as well as DDOS attacks. Moreover, a handful of countermeasures have also been depicted here. In a nutshell, it aims at raising an awareness by outlining a clear picture of the Cloud availability issues.Our paper gives a comparative study of different techniques of detecting DOS.


2018 ◽  
Vol 10 (3) ◽  
pp. 61-83 ◽  
Author(s):  
Deepali Chaudhary ◽  
Kriti Bhushan ◽  
B.B. Gupta

This article describes how cloud computing has emerged as a strong competitor against traditional IT platforms by offering low-cost and “pay-as-you-go” computing potential and on-demand provisioning of services. Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent. Therefore, the paradigm of cloud computing is no longer sufficient. Furthermore, with the growth of demand for IoT solutions in organizations, it has become essential to process data quickly, substantially and on-site. Hence, Fog computing is introduced to overcome these drawbacks of cloud computing by bringing intelligence to the edge of the network using smart devices. One major security issue related to the cloud is the DDoS attack. This article discusses in detail about the DDoS attack, cloud computing, fog computing, how DDoS affect cloud environment and how fog computing can be used in a cloud environment to solve a variety of problems.


2018 ◽  
Vol 30 (4) ◽  
pp. 14-31 ◽  
Author(s):  
Suyel Namasudra ◽  
Pinki Roy

This article describes how nowadays, cloud computing is one of the advanced areas of Information Technology (IT) sector. Since there are many hackers and malicious users on the internet, it is very important to secure the confidentiality of data in the cloud environment. In recent years, access control has emerged as a challenging issue of cloud computing. Access control method allows data accessing of an authorized user. Existing access control schemes mainly focus on the confidentiality of the data storage. In this article, a novel access control scheme has been proposed for efficient data accessing. The proposed scheme allows reducing the searching cost and accessing time, while providing the data to the user. It also maintains the security of the user's confidential data.


2012 ◽  
Vol 3 (2) ◽  
pp. 51-59 ◽  
Author(s):  
Nawsher Khan ◽  
A. Noraziah ◽  
Elrasheed I. Ismail ◽  
Mustafa Mat Deris ◽  
Tutut Herawan

Cloud computing is fundamentally altering the expectations for how and when computing, storage, and networking resources should be allocated, managed, consumed, and allow users to utilize services globally. Due to the powerful computing and storage, high availability and security, easy accessibility and adaptability, reliable scalability and interoperability, cost and time effective cloud computing is the top, needed for current fast growing business world. A client, organization or a trade that adopting emerging cloud environment can choose a well suitable infrastructure, platform, software, and a network resource, for any business, where each one has some exclusive features and advantages. The authors first develop a comprehensive classification for describing cloud computing architecture. This classification help in survey of several existing cloud computing services developed by various projects globally such as Amazon, Google, Microsoft, Sun and Force.com and by using this survey’s results the authors identified similarities and differences of the architecture approaches of cloud computing.


Author(s):  
Minakshi Sharma ◽  
Rajneesh Kumar ◽  
Anurag Jain

Cloud load balancing is done to persist the services in the cloud environment along with quality of service (QoS) parameters. An efficient load balancing algorithm should be based on better optimization of these QoS parameters which results in efficient scheduling. Most of the load balancing algorithms which exist consider response time or resource utilization constraints but an efficient algorithm must consider both perspectives from the user side and cloud service provider side. This article presents a load balancing strategy that efficiently allocates tasks to virtualized resources to get maximum resource utilization in minimum response time. The proposed approach, join minimum loaded queue (JMLQ), is based on the existing join idle queue (JIQ) model that has been modified by replacing idle servers in the I-queues with servers having one task in execution list. The results of simulation in CloudSim verify that the proposed approach efficiently maximizes resource utilization by reducing the response time in comparison to its other variants.


2019 ◽  
Vol 16 (2) ◽  
pp. 764-767
Author(s):  
P. Chitra ◽  
Karthika D. Renuka ◽  
K. Senathipathi ◽  
S. Deepika ◽  
R. Geethamani

Cloud computing is the cutting edge technology in the information field to provide services to the users over the internet through web–based tools and applications. One of the major aspects of cloud computing is load balancing. Challenges like Quality of service (QoS) metrics and resource utilization can be improved by balancing the load in cloud environment. Specific scheduling criteria can be applied using load balancing for users prioritization. This paper surveys different load balancing algorithms. The approaches that are existing are discussed and analyzed to provide fair load balancing and also a comparative analysis was presented for the performance of the existing different load balancing schemes.


2016 ◽  
Vol 13 (10) ◽  
pp. 7655-7660 ◽  
Author(s):  
V Jeyakrishnan ◽  
P Sengottuvelan

The problem of load balancing in cloud environment has been approached by different scheduling algorithms. Still the performance of cloud environment has not been met to the point and to overcome these issues, we propose a naval ADS (Availability-Distribution-Span) Scheduling method to perform load balancing as well as scheduling the resources of cloud environment. The method performs scheduling and load balancing in on demand nature and takes dynamic actions to fulfill the request of users. At the time of request, the method identifies set of resources required by the process and computes Availability Factor, Distributional Factor and Span Time factor for each of the resource available. Based on all these factors computed, the method schedules the requests to be processed in least span time. The proposed method produces efficient result on scheduling as well as load balancing to improve the performance of resource utilization in the cloud environment.


2020 ◽  
Vol 17 (6) ◽  
pp. 2430-2434
Author(s):  
R. S. Rajput ◽  
Dinesh Goyal ◽  
Rashid Hussain ◽  
Pratham Singh

The cloud computing environment is accomplishing cloud workload by distributing between several nodes or shift to the higher resource so that no computing resource will be overloaded. However, several techniques are used for the management of computing workload in the cloud environment, but still, it is an exciting domain of investigation and research. Control of the workload and scaling of cloud resources are some essential aspects of the cloud computing environment. A well-organized load balancing plan ensures adequate resource utilization. The auto-scaling is a technique to include or terminate additional computing resources based on the scaling policies without involving humans efforts. In the present paper, we developed a method for optimal use of cloud resources by the implementation of a modified auto-scaling feature. We also incorporated an auto-scaling controller for the optimal use of cloud resources.


Sign in / Sign up

Export Citation Format

Share Document