Engineering Authentication Process with Cloud Computing
DOI:
https://doi.org/10.32628/CSEIT195259Keywords:
Cloud Computing, Security, Encryption, sign-on, Kerberos, DDOSAbstract
Cloud computing is a way to increase the capacity or add capabilities dynamically without any upfront investments. Despite the growth achieved from the cloud computing, security is still questionable which impacts the cloud model adoption. Aside of having network and application securities being adopted, there must be a security that authenticate the user when accessing the cloud services that is bound to the rules between the cloud computing provider and the client side. The existing system provides authentication based on keys Encryption algorithms either symmetric key-based or asymmetric are key-based. Both encryption approaches have a major problem related to encryption key management i.e. how to securely generate, store, access and exchange secrete keys. In this paper, an optimized infrastructure for secure authentication and authorization in Cloud Environment using SSO (Single Sign-On) is proposed. SSO is a process of authenticating once and gain access of multiple resources that aims at reducing number of login and password in heterogeneous environment and to gain balance in Security, Efficiency and Usability. Also an authentication model for cloud computing based on the Kerberos protocol to provide single sign-on and to prevent against DDOS attacks is also presented in this paper.
References
- Minqi Zhou, Rong Zhang and others, “Security and Privacy in Cloud Computing: A Survey”, Sixth International Conference on Semantics, Knowledge and Grids, IEEE, 2010
- Kevin Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham, “Security Issues for Cloud Computing”, International Journal of Information Security and Privacy, 4(2), April-June 2010
- Richard Chow, Philippe Golle, Markus Jakobsson, “Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control”, Fujitsu Laboratories of America, CCS. 2009
- B.Meena, Krishnaveer Abhishek Challa, “Cloud Computing Security Issues with Possible Solutions”, IJCST Vol. 3, Issue 1, Jan. - March 2012
- Farhan Bashir Shaikh and Sajjad Haider, “Security Threats in Cloud Computing”, 6th International Conference on Internet Technology and Secured Transactions, IEEE, 11-14 December 2011
- Chi-Chun Lo, Chun-Chieh Huang and Joy Ku, “A Cooperative Intrusion Detection System Framework for Cloud Computing Networks”, 39th International Conference on Parallel Processing Workshops, 2010
- AO Shan and Guo Shuangzhou, “An enhancement technology about system security based on dynamic information flow tracking”, IEEE, 2011
- Bansidhar Joshi, A. Santhana Vijayan, “Securing Cloud Computing Environment Against DDoS Attacks, ICCCI, IEEE, Jan 10-12, 2012
- Yang Xiang and Wanleiu Zhou, “A Defense System Against DDoS Attacks by Large-Scale IP Traceback”, ICITA’05, IEEE, 2005
- Ashley Chonka, Wanlei Zhou, Jaipal Singh, Yang Xiang, “Detecting and Tracing DDoS attacks by Intelligent Decision Prototype”, PERCOM.2008, IEEE
- An Lei and Zhu Youchan, “The Solution of DDOS attack based on Multi-agent”, ICEIT 2010, IEEE
- Zubair Ahmad and Jamalul-Lail Ab Manan, “Trusted Computing based Open Environment User Authentication Model”, 3rd International Conference on Advanced Computer Theory and Engineering(ICA CTE), IEEE, 2010
- Nitin, Durg Singh Chauhan et al, “Security Analysis and Implementation of *JUIT–Image Based Authentication System using Kerberos Protocol”, Seventh IEEE/ACIS International Conference on Computer and Information Science, 2008
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.