Security of Cloud Computing Lightweight Authentication Protocol

2013 ◽  
Vol 284-287 ◽  
pp. 3502-3506 ◽  
Author(s):  
Shu Ching Wang ◽  
Wen Pin Liao ◽  
Kuo Qin Yan ◽  
Shun Sheng Wang ◽  
Szu Hao Tsai

Nowadays, network bandwidth and hardware technology are developing rapidly, resulting in the vigorous development of the Internet. However, cloud computing, an Internet-based development in which dynamically scalable and often virtualized resources are provided as a service over the Internet has become a significant issue. According to the characteristics of cloud computing, there are a lot of applications and data centers in the cloud-computing environment, hence, the issues of information and communication security and authentication must to be considered. However, the most of the studies on the security and authentication require large amounts of computing resource; therefore not suitable for the cloud-computing environment. In this paper, a lightweight computing protocol, Lightweight Authentication Protocol (LAP), is proposed to enhance the security of cloud computing environment and provide the authentication of service.

Sensors ◽  
2020 ◽  
Vol 20 (19) ◽  
pp. 5604
Author(s):  
Hsiao-Ling Wu ◽  
Chin-Chen Chang ◽  
Yao-Zhu Zheng ◽  
Long-Sheng Chen ◽  
Chih-Cheng Chen

The Internet of Things (IoT) is currently the most popular field in communication and information techniques. However, designing a secure and reliable authentication scheme for IoT-based architectures is still a challenge. In 2019, Zhou et al. showed that schemes pro-posed by Amin et al. and Maitra et al. are vulnerable to off-line guessing attacks, user tracking attacks, etc. On this basis, a lightweight authentication scheme based on IoT is proposed, and an authentication scheme based on IoT is proposed, which can resist various types of attacks and realize key security features such as user audit, mutual authentication, and session security. However, we found weaknesses in the scheme upon evaluation. Hence, we proposed an enhanced scheme based on their mechanism, thus achieving the security requirements and resisting well-known attacks.


2014 ◽  
Vol 1008-1009 ◽  
pp. 1513-1516
Author(s):  
Hai Na Song ◽  
Xiao Qing Zhang ◽  
Zhong Tang He

Cloud computing environment is regarded as a kind of multi-tenant computing mode. With virtulization as a support technology, cloud computing realizes the integration of multiple workloads in one server through the package and seperation of virtual machines. Aiming at the contradiction between the heterogeneous applications and uniform shared resource pool, using the idea of bin packing, the multidimensional resource scheduling problem is analyzed in this paper. We carry out some example analysis in one-dimensional resource scheduling, two-dimensional resource schduling and three-dimensional resource scheduling. The results shows that the resource utilization of cloud data centers will be improved greatly when the resource sheduling is conducted after reorganizing rationally the heterogeneous demands.


Author(s):  
Lavanya S. ◽  
Susila N. ◽  
Venkatachalam K.

In recent times, the cloud has become a leading technology demanding its functionality in every business. According to research firm IDC and Gartner study, nearly one-third of the worldwide enterprise application market will be SaaS-based by 2018, driving annual SaaS revenue to $50.8 billion, from $22.6 billion in 2013. Downtime is treated as the primary drawback which may affect great deals in businesses. The service unavailability leads to a major disruption affecting the business environment. Hence, utmost care should be taken to scale the availability of services. As cloud computing has plenty of uncertainty with respect to network bandwidth and resources accessibility, delegating the computing resources as services should be scheduled accordingly. This chapter proposes a study on cloud of clouds and its impact on a business enterprise. It is also decided to propose a suitable scheduling algorithm to the cloud of cloud environment so as to trim the downtime problem faced by the cloud computing environment.


2018 ◽  
Vol 9 (3) ◽  
pp. 23-31
Author(s):  
Narander Kumar ◽  
Surendra Kumar

The internet has become essential and is the basis of cloud computing and will continue to be in the future. Best resource allocation is a process of placing the resources at their minimum cost/time and minimizes the load to a virtual machine. In this article, the authors propose an algorithm to optimize assignment problems and get the best placements in the resources to maintain the load on the virtual machine. Further, they also make comparisons between various optimization mechanisms for assignment problems, which is formulated for the cloud in virtual machine placement.


2021 ◽  
Vol 12 (4) ◽  
pp. 1041-1053
Author(s):  
Ibrahim Mahmood Ibrahim, Et. al.

Cloud computing is the requirement based on clients and provides many resources that aim to share it as a service through the internet. For optimal use, Cloud computing resources such as storage, application, and other services need managing and scheduling these services. The principal idea behind the scheduling is to minimize loss time, workload, and maximize throughput. So, the scheduling task is essential to achieve accuracy and correctness on task completion. This paper gives an idea about various task scheduling algorithms in the cloud computing environment used by researchers. Finally, many authors applied different parameters like completion time, throughput, and cost to evaluate the system.


Author(s):  
Mahendra Kumar Gourisaria ◽  
S. S. Patra ◽  
P. M. Khilar

<p>Cloud computing is an emerging field of computation. As the data centers consume large amount of power, it increases the system overheads as well as the carbon dioxide emission increases drastically. The main aim is to maximize the resource utilization by minimizing the power consumption. However, the greatest usages of resources does not mean that there has been a right use of energy.  Various resources which are idle, also consumes a significant amount of energy. So we have to keep minimum resources idle. Current studies have shown that the power consumption due to unused computing resources is nearly 1 to 20%. So, the unused resources have been assigned with some of the tasks to utilize the unused period. In the present paper, it has been suggested that the energy saving with task consolidation which has been saved the energy by minimizing the number of idle resources in a cloud computing environment. It has been achieved far-reaching experiments to quantify the performance of the proposed algorithm. The same has also been compared with the FCFSMaxUtil and Energy aware Task Consolidation (ETC) algorithm. The outcomes have shown that the suggested algorithm surpass the FCFSMaxUtil and ETC algorithm in terms of the CPU utilization and energy consumption.</p>


Author(s):  
Sushanta Meher ◽  
Sohan Kumar Pande ◽  
Sanjaya Kumar Panda

Cloud computing provides access to various services such as servers, storage and applications to the customers' as and when required. The services on the cloud can be accessed with minimum efforts through any handheld devices that are connected to the Internet. In IaaS cloud, the services to the customers are provided in the form of two leases, AR and BE. Here, a running BE lease can be preempted upon arrival of an AR lease as BE has lower priority. However, frequent preemption of the BE lease causes an overhead to the system and leads to customer dissatisfaction. In this paper, we propose a fairness algorithm called TATA to provide fairness among the leases. We evaluate the proposed algorithm on various synthetic datasets and compare the results with an existing fairness algorithm. The results of simulation show that TATA produces better response time for both the leases than the existing algorithm.


2020 ◽  
Vol 2020 ◽  
pp. 1-6
Author(s):  
Baoyuan Kang ◽  
Yanbao Han ◽  
Kun Qian ◽  
Jianqi Du

Recently, a number of authentication protocols integrated with the Internet of Things (IoT) and cloud computing have been proposed for secure access control on large-scale IoT networks. In this paper, we carefully analyze Amin et al.’s authentication protocol for IoT-enabled devices in distributed cloud computing environment and find that Amin et al.’s protocol is vulnerable to several weaknesses. The main shortcoming of Amin et al.’s protocol is in authentication phase; a malicious cloud server can counterfeit the cloud server chosen by a user, and the control server cannot find this counterfeit. To overcome the shortcomings of Amin et al.’s protocol, we propose an improved protocol. In the registration phase of the improved protocol, the pseudoidentity and real identity of a user or a cloud server are bundled up with the control server’s secret numbers. This measure can effectively prevent impersonation attack. We also compare the improved protocol with several existing authentication protocols in security and computational efficiency.


2014 ◽  
Vol 509 ◽  
pp. 170-174
Author(s):  
Xiang Jian Wei

The traditional audit model is the audit organ procurement respectively the application server, database server and network audit system, and then the auditor through the office LAN access audit information system. Each audit institution needs to configure the independent hardware and software resources in the audit mode, the result will generate IT costs high and professional maintenance costs are high and need a lot of professional maintenance staff. Development and utilization of cloud computing become the factors or not but with the popularity of IT applications in various industries department. Cloud computing is outside of the Internet industry, and further affect the accounting and auditing profession, bring new challenges in the development of cloud computing to audit, (Rongsheng-Qin, 2013). Today, under the rapid development of cloud computing, cloud computing concepts of how to use the Internet, how to through the cloud storage data, coordinated various audit resources in the cloud, for the auditor to provide more efficient, more scientific audit process, finally realizes the auditing organs at all levels of hardware resources, software resources, Shared services, to optimize the use of audit resources fully, is China's national audit problems to be solved in the future. This paper build a cloud computing environment audit the basic frame of information system under the research and application status of cloud computing.


Sign in / Sign up

Export Citation Format

Share Document