Engineering Authentication Process with Cloud Computing

Authors(2) :-G. Nivedhitha, R. Ilakkiya

Cloud computing is a way to increase the capacity or add capabilities dynamically without any upfront investments. Despite the growth achieved from the cloud computing, security is still questionable which impacts the cloud model adoption. Aside of having network and application securities being adopted, there must be a security that authenticate the user when accessing the cloud services that is bound to the rules between the cloud computing provider and the client side. The existing system provides authentication based on keys Encryption algorithms either symmetric key-based or asymmetric are key-based. Both encryption approaches have a major problem related to encryption key management i.e. how to securely generate, store, access and exchange secrete keys. In this paper, an optimized infrastructure for secure authentication and authorization in Cloud Environment using SSO (Single Sign-On) is proposed. SSO is a process of authenticating once and gain access of multiple resources that aims at reducing number of login and password in heterogeneous environment and to gain balance in Security, Efficiency and Usability. Also an authentication model for cloud computing based on the Kerberos protocol to provide single sign-on and to prevent against DDOS attacks is also presented in this paper.

Authors and Affiliations

G. Nivedhitha
Computer Science and engineering, Sri Krishna College of Technology, Coimbatore, Tamilnadu, India
R. Ilakkiya
Computer Science and engineering, Sri Krishna College of Technology, Coimbatore, Tamilnadu, India

Cloud Computing, Security, Encryption, sign-on, Kerberos, DDOS

  1. Minqi Zhou, Rong Zhang and others, “Security and Privacy in Cloud Computing: A Survey”, Sixth International Conference on Semantics, Knowledge and Grids, IEEE, 2010
  2. Kevin Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham, “Security Issues for Cloud Computing”, International Journal of Information Security and Privacy, 4(2), April-June 2010
  3. Richard Chow, Philippe Golle, Markus Jakobsson, “Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control”, Fujitsu Laboratories of America, CCS. 2009
  4. B.Meena, Krishnaveer Abhishek Challa, “Cloud Computing Security Issues with Possible Solutions”, IJCST Vol. 3, Issue 1, Jan. - March 2012
  5. Farhan Bashir Shaikh and Sajjad Haider, “Security Threats in Cloud Computing”, 6th International Conference on Internet Technology and Secured Transactions, IEEE, 11-14 December 2011
  6. Chi-Chun Lo, Chun-Chieh Huang and Joy Ku, “A Cooperative Intrusion Detection System Framework for Cloud Computing Networks”, 39th International Conference on Parallel Processing Workshops, 2010
  7. AO Shan and Guo Shuangzhou, “An enhancement technology about system security based on dynamic information flow tracking”, IEEE, 2011
  8. Bansidhar Joshi, A. Santhana Vijayan, “Securing Cloud Computing Environment Against DDoS Attacks, ICCCI, IEEE, Jan 10-12, 2012
  9. Yang Xiang and Wanleiu Zhou, “A Defense System Against DDoS Attacks by Large-Scale IP Traceback”, ICITA’05, IEEE, 2005
  10. Ashley Chonka, Wanlei Zhou, Jaipal Singh, Yang Xiang, “Detecting and Tracing DDoS attacks by Intelligent Decision Prototype”, PERCOM.2008, IEEE
  11. An Lei and Zhu Youchan, “The Solution of DDOS attack based on Multi-agent”, ICEIT 2010, IEEE
  12. Zubair Ahmad and Jamalul-Lail Ab Manan, “Trusted Computing based Open Environment User Authentication Model”, 3rd International Conference on Advanced Computer Theory and Engineering(ICA CTE), IEEE, 2010
  13. Nitin, Durg Singh Chauhan et al, “Security Analysis and Implementation of *JUIT–Image Based Authentication System using Kerberos Protocol”, Seventh IEEE/ACIS International Conference on Computer and Information Science, 2008

Publication Details

Published in : Volume 5 | Issue 2 | March-April 2019
Date of Publication : 2019-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 246-253
Manuscript Number : CSEIT195259
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

G. Nivedhitha, R. Ilakkiya, "Engineering Authentication Process with Cloud Computing", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 2, pp.246-253, March-April-2019. Available at doi : https://doi.org/10.32628/CSEIT195259
Journal URL : http://ijsrcseit.com/CSEIT195259

Article Preview