scholarly journals Energy-Efficient Routing for Performance and Network Lifetime Enhancement in Wireless Sensor Networks

Protection is one of the key factors to be considered in application development. Every application should follow some security mechanisms to be free from fraudulent users. One of the important criteria to ensure security is Access control. [4]The reliability and security of the cloud and user are assured and effectively guaranteed during its interaction in the cloud computing environment. But these traditional models were unable to determine the vulnerability and ambiguity created by these open conditions. So the main focus throughout the evolution of new access control methods is on creating a mutual trust relationship between both interaction parties. The paper proposes a mutual access control model which is trust-based (MTBAC). Trust relationships between both interaction bodies are secured by mutual trust mechanisms. This model takes both the cloud service node’s trustworthiness and user’s action trust into consideration.

2016 ◽  
pp. 1053-1066 ◽  
Author(s):  
Nitin Nagar ◽  
Ugrasen Suman

Cloud computing is comprised of major demand from the every group of organization because of easy availability and cost effectiveness. The responsibilities of cloud service providers will become increasing more due to the great progression in every cloud computing deployment model (public, private and hybrid) and service models (SaaS, PaaS and IaaS). In this perspective, cloud computing faces multiple challenges, especially in cloud computing security at all levels (e.g., host, network, application and data levels). Authentication is the constantly the biggest concerned for IT industries to adopt cloud computing environment. The availability, performance, key logger attack, malicious insiders, outsider attacks and service disruptions explore (service hijacking) issues are the key research challenges in the cloud computing authentication level. In this aspect, traditional user name and password is not enough as a single factor (first factor). This paper has proposed a secure cloud computing framework which uses first factor as a crypt user name and password with the ATM pin as a second factor called M-pin. The proposed work focuses on a solution to the threats that are the major issues in the cloud adoption.


Sign in / Sign up

Export Citation Format

Share Document