A NOVEL APPROACH TO PUBLIC AUTHENTICATION IN CLOUD ENVIRONMENT USING HASH PARAMETER
Cloud computing is the latest computing model that provides IT as service to end user. User can use services like infrastructure, platform and software’s and pay according to their usage. This model enable user to get rid of investing and maintain infrastructure at their end. However cloud computing is a dynamic and complex model that requires various task management and planning for efficient utilization of resources. Planning security in cloud environment is quite troublesome and challenging. Although there are numerous techniques enforced within the cloud environment for the protection of the data storage in cloud. Security is a major concern throughout the transmission of information from the sender to the receiver in any environment. Cloud provider has to ensure information integrity and confidentiality from several nodes to a selected place throughout the various implementation of cloud model like public or hybrid cloud. Here we propose a novel security technique for public authentication through adding one more level to it. Such that once a number of clouds are enforced and then the information is hold on dynamically and enable the verifiability of the node from one cloud to a different and also to enhance the security of the information dynamics.
J. Yu and R. Buyya, A Taxonomy of Workflow Management Systems for Grid Computing, Journal of Grid Computing, Springer, 3(3-4): 171-200, Spring Sci-ence+Business Media B.V., New York, USA, Sept. 2005.
JiaYu, Rajkumar Buyya and Kotagiri Ramamohanarao,“Workflow Scheduling Algorithms for Grid Computing”, Metaheuristics for Scheduling in Distributed Computing Environments Studies in Computational Intelligence Volume 146, 2008, pp 173-214 @ Springer-Verlag Berlin Heidelberg.
Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, Jason Flinn, Farnam Jahanian,“Virtualized In-Cloud Security Services for Mobile Devices”, MobiVirt '08 Proceedings of the First Workshop on Virtualization in Mobile Computing, Pages 31-35 ACM New York, NY,USA ©2008.
Xinwen Zhang, Joshua Schiffman, Simon Gibbs,Anugeetha Kunjithapatham, and Sangoh Jeong,”Securing Elastic Applications on Mobile Devices for Cloud Computing”, CCSW’09, November 13,2009, ACM Chicago, Illinois, USA.
Qian Wang, Cong Wang, Jin Li, Kui Ren, andnWenjing Lou, “Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing”, ESORICS'09 Proceedings of the 14th European conference on Research in computer security, Pages 355-370 Springer-Verlag Berlin, Heidelberg ©2009. Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau4,” Efficient Provable Data Possession for Hybrid Clouds”, CCS’10, October 4–8, 2010, ACM Chicago, Illinois, USA.
Jean Bacon, David Evans, David M. Eyers, Matteo Migliavacca, Brian Shand and Peter Pietzuch, “Enforcing End-to-end Application Security in the Cloud”, Middleware '10 Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware, Pages 293-312 Springer-Verlag Berlin, Heidelberg ©2010.
Xiang Li, Jing Liu, Jun Han, Qian Zhang,” The Architecture Design of Micro-Learning Platform Based on Cloud Computing”, ICCC’11, August13–14, 2011, ACM Wuhan, China.
F. Omr, S. FoufoU, R. HamiIa & M. Jarraya presented paper entitled ―Cloud based Mobile System for Biometrics Authentication‖ at IEEE 2013 13th International Conference on ITS Telecommunications (ITST).
Haoming Liang, Wenbo Chen and Kefu Shi,"Cloud Computing: Programming Model andInformation Exchange Mechanism", ICCC’11,August 13–14, 2011, ACM Wuhan, China.
Guannan HU, Wenhao ZHU, Wu ZHANG and Shijun SHEN,"A Dynamic User-integrated CloudComputing Architecture", ICCC’11, August 13–14, 2011, ACM Wuhan, China.
Tekin Bicer, David Chiu and Gagan Agrawal,“Time and Cost Sensitive Data-IntensiveComputing on Hybrid Clouds", 978-0-7695-4691-9/12 $26.00 © 2012 IEEE.
Alex Kantchelian, Justin Ma, Ling Huang, SadiaAfroz, J. D. Tygar and Anthony D. Joseph,“Robust Detection of Comment Spam UsingEntropy Rate”, AISec’12, October 19, 2012,ACM Raleigh, North Carolina, USA.
Luís Mendonça and Henrique Santos, “Botnets: A Heuristic-Based Detection Framework”, SIN'12, October 25-27, 2012, ACM Jaipur, Rajastan, India.
Arash Nourian and Muthucumaru Maheswaran,“Towards Privacy Enhanced Limited Image Processing in the Clouds”, Middleware 2012 Doctoral Symposium, December 3, 2012, ACM Montreal, Quebec, Canada.
Pengfei Sun, Qingni Shen, Ying Chen,Zhonghai Wu and Cong Zhang," POSTER: LBMS: Load Balancing based on Multilateral Security in Cloud", CCS’11, October 17–21, 2011, ACM Chicago, Illinois, USA.
Carla Merkle Westphall, Daniel Ricardo dos Santos and Carlos Becker Westphall, “A Dynamic Risk-based Access Control Architecture for Cloud Computing”, 978-1-4799-0913-1/14/$31.00 c 2014 IEEE.
M. Sethumadhavan and Nimmy K., “Novel Mutual Authentication Protocol for CloudComputing using Secret Sharing and Steganography”,978-1-4799-2259 14/$31.00©2014 IEEE.
R. Bajaj and D. P. Agrawal, Improving Scheduling of Tasks in a Heterogeneous Environment, IEEE Transactions on Parallel and Distributed Systems, 15:107 118, 2004.
- There are currently no refbacks.