DPCA: Dual Phase Cloud Infrastructure Authentication

نویسندگان

  • R. Thandeeswaran
  • M. A. Saleem Durai
چکیده

Every user appreciates the security of their data irrespective of its sensitivity. At the same time, user does not want to be held up with the legacy systems, which may be strongly secured but not with fantasy. Network travelled many phases of its own such as internet, intranet, wireless network, sensor network, Ad-hoc network, Mobile network, Blue-tooth, Cloud and IoT, the most popular technique now. Hence, whatever the type of network hitting the end user with improvised quality, get compromised in security. People feel pleasure upon sharing their moments with their connections. Huge amount of data are in transit either by means of storing them in cloud or retrieving. Users lose control over their data, they are unaware about the people accessing and modifying. Hence DataCentres have to be protected from unauthorized illegal access. Illegal data access may be initiated by a boot or a bot. Man or a Machine discrimination has been resolved with CAPTCHA. This paper, DPCA, proposes an authentication at two different phases. In the first phase, the user is authenticated with the new type of CAPTCHA. With this methodology, user is segregated as man or machine. Thereby bot-nets are filtered out and the flooding messages from bots are mitigated. In the second phase, where only man is allowed to access the cloud resources, he is authenticated with Dempster Shafter hypothetical approach combined with the user intent and not the content. DPCA has been tested in the infrastructure and the experimental results proved the strength of the algorithm.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

Tight Finite Key Scheme for Quantum Key Distribution (qkd) Protocol to Authenticate Multi- Party System in Cloud Infrastructure

Confidentiality, integrity and authentication are the key concerns in this cloud infrastructure. The aim of this research is to introduce a new tight finite key scheme for authentication process in order to establish a connection between legitimate users in cloud infrastructure. In this case we are using quantum channel and also quantum key distribution (QKD) protocol to replace the existing co...

متن کامل

Two Factor Authentication for Cloud Computing

— The fast-emerging of cloud computing technology today has sufficiently benefited its wide range of users from individuals to large organizations. It carries an attractive characteristic by renting myriad virtual storages, computing resources and platform for users to manipulate their data or utilize the processing resources conveniently over Internet without the need to know the exact underly...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJCNIS

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2016