A Hybrid Multilevel Authentication Scheme for Private Cloud Environment

被引:0
|
作者
Sridhar, S. [1 ]
Smys, S. [2 ]
机构
[1] Alpha Coll Engn, Bengaluru, Karnataka, India
[2] Karpagam Coll Engn, Dept IT, Coimbatore, Tamil Nadu, India
关键词
Cloud Computing; Authentication; Security; Private Cloud;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud Computing is the ubiquitous model of a shared pool of configurable computing resources. this paper proposes a multilevel authentication technique for use in Private Cloud network. Authentication of User is a challenging issue due to increasing security threats as it acts as the first defence against attackers. Whole authentication control lies in the server Side so Single-tier authentication is not enough to overcome these problems. We come up with a novel authentication mechanism, called Hybrid Multilevel Authentication, which provides the security against the insider attacks and virtualization attacks. Positives and negatives of other cloud setup were considered. Encryption function is implemented by symmetry-based AES encryption algorithm. This model provides a level of security for each member of that organisation.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Randomized approximation scheme for resource allocation in hybrid-cloud environment
    MohammadReza HoseinyFarahabady
    Young Choon Lee
    Albert Y. Zomaya
    The Journal of Supercomputing, 2014, 69 : 576 - 592
  • [42] A hybrid instance-intensive workflow scheduling method in private cloud environment
    Xin Ye
    Jia Li
    Sihao Liu
    Jiwei Liang
    Yaochu Jin
    Natural Computing, 2019, 18 : 735 - 746
  • [43] A hybrid instance-intensive workflow scheduling method in private cloud environment
    Ye, Xin
    Li, Jia
    Liu, Sihao
    Liang, Jiwei
    Jin, Yaochu
    NATURAL COMPUTING, 2019, 18 (04) : 735 - 746
  • [44] ENHANCED DATA SECURITY FOR PUBLIC CLOUD ENVIRONMENT WITH SECURED HYBRID ENCRYPTION AUTHENTICATION MECHANISMS
    Prabu, S.
    Ganapathy, Gopinath
    Goyal, Ranjan
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2018, 19 (04): : 351 - 360
  • [45] Optimal scheduling across public and private clouds in complex hybrid cloud environment
    Li Chunlin
    Li LaYuan
    INFORMATION SYSTEMS FRONTIERS, 2017, 19 (01) : 1 - 12
  • [46] Optimal scheduling across public and private clouds in complex hybrid cloud environment
    Li Chunlin
    Li LaYuan
    Information Systems Frontiers, 2017, 19 : 1 - 12
  • [47] Enhanced data security for public cloud environment with secured hybrid encryption authentication mechanisms
    Prabu S.
    Ganapathy G.
    Goyal R.
    Scalable Computing, 2018, 19 (04): : 351 - 360
  • [48] An authentication scheme for distributed computing environment
    Jan S.U.
    Qayum F.
    Jan, Saeed Ullah (saeedullah@uom.edu.pk), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (13): : 227 - 248
  • [49] Secure authentication scheme for IoT and cloud servers
    Department of Computer Science and Engineering, Guru Nanak Dev University, Regional Campus, Jalandhar
    Punjab
    144001, India
    不详
    Punjab
    143521, India
    Pervasive Mob. Comput., (210-223):
  • [50] Comments on the Authentication Scheme for IoT and Cloud Servers
    Cheng, Ting-Fang
    2016 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-TAIWAN (ICCE-TW), 2016, : 7 - 8