A COUNTERMEASURE FOR SECURITY INTENSIFICATION IN CLOUD USING CaPGP
ثبت نشده
چکیده
The malware attacks attempt to deplete the cloud services with bogus request which is a major threat in cloud. A mechanism to intensify the login security in cloud is suggested. The concept of CaPGP – CAPTCHA as Puzzle and Graphical Password is introduced because CAPTCHA is one way to discriminate human and malware apart. The computations at the client side are made intensive than on the server side by making the malwares fail to resolve and attempt to attack. The client is made to resolve the software puzzle that is generated randomly with time constraints where the malware is defeated. The password is made stronger so as to counter the guessing attacks and cookies during login. CAPTACHA’s nowadays are cracked easily by Optical Character Reader (OCR) which proves the technological advancement. Hence image based CAPTCHA which requires the verification task to be complete after the mouse click where OCR also fails. Moreover the proposed system shows how to implement the software puzzle in generic server-browser model.
منابع مشابه
A Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملA particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs
To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...
متن کامل