A Three-Party Cloud Authentication Framework for Enhanced Security and Integrity

Authors

  • Rajesh Gundla  Research Scholar, CSE, Shridhar University, Pilani, Rajasthan, India
  • Sunil Gupta  Associate Professor, Dept. Of Computer science and Engineering, Shridhar University, Pilani, Rajasthan, India
  • C. Srinivasa Kumar  Professor, Dept. Of Computer science and Engineering, Vignan's Institute of Management and Technology for Women, Hyderabad, Telangana, India

Keywords:

HTTPS Protocol, Cloud computing, IT Services, Service Level Agreement

Abstract

This paper provides a comprehensive overview of the security and privacy issues faced by organizations using cloud computing. It defines cloud computing and discusses the different types of services and deployment models. The paper presents suggested solutions that can help organizations address operational, technical, and legal issues related to cloud computing while meeting the needs of users. Cloud computing providers must protect the sensitive data of their customers to provide reliable services, and the paper proposes various solutions to address these concerns. However, the authors caution that these solutions are not a complete picture of how fast technological innovation can occur. The paper emphasizes the importance of encryption in protecting the confidentiality and integrity of data and highlights the use of SSL encryption methods to secure web services that use the HTTPS protocol.

References

  1. Anbuchelian, S.; Sowmya, C.M.; Ramesh, C. Efficient and secure auditing scheme for privacy preserving data storage in cloud. Clust. Comput. 2019, 22, 9767–9775.
  2. Babu, S. Dilli, and Rajendra Pamula. "An effective block-chain based authentication technique for cloud based IoT." Advances in Computing and Data Sciences: 4th International Conference, ICACDS 2020, Valletta, Malta, April 24–25, 2020, Revised Selected Papers 4. Springer Singapore, 2020.
  3. Wang, H.; Wang, Z.; Domingo-Ferrer, J.: Anonymous and secure aggregation scheme in fog-based public cloud computing. Future Gener. Comput. Syst. 78, 712–719 (2018)
  4. Wazid,M.; Das, A.K.; Kumar, N.; Vasilakos, A.V.: Design of secure key management and user authentication scheme for fog computing services. Future Gener. Comput. Syst. 91, 475–492 (2019)
  5. Chandrakar, P.; Om, H.: A secure and privacy preserving remote user authentication protocol for internet of things environment. In: International conference on computational intelligence, communications, and business analytics, pp. 537–551, Springer, Berlin (2017)
  6. Armando, A.; Basin, D.; Boichut, Y.; Chevalier, Y.; Compagna, L.; Cuéllar, J.; Drielsma, P. H.; Héam, P.-C.; Kouchnarenko, O.; Mantovani, J. et al.: The avispa tool for the automated validation of internet security protocols and applications. In: International conference on computer aided verification, pp. 281–285, Springer, Berlin (2005)
  7. Kumar, A.; Om, H.: Lightweight, ecc based rfid authentication scheme for wlan. Int. J. Bus. Data Commun. Netw. (IJBDCN) 12(2), 89–103 (2016)
  8. Stallings, W.: Cryptogr. Netw. Secur. Pearson Education, India (2006)
  9. Paar, C.; Pelzl, J.: Understanding cryptography: a textbook for students and practitioners. Springer Science and Business Media, Berlin (2009)
  10. Ray, S.; Biswas, G.: Establishment of ecc-based initial secrecy usable for ike implementation. In: Proceedings of the world congress on engineering, vol. 1, (2012).
  11. Ku, W.-C.; Chang, S.-T.: Impersonation attack on a dynamic idbased remote user authentication scheme using smart cards. IEICE Trans. Commun. 88(5), 2165–2167 (2005)
  12. Wu, Z.; Gao, S.; Cling, E. S.; Li, H.: A study on replay attack and anti-spoofing for text-dependent speaker verification. In: Signal and information processing association annual summit and conference (APSIPA), 2014 Asia-Pacific, pp. 1–5, IEEE, (2014)
  13. Liu, H.: A new form of dos attack in a cloud and its avoidance mechanism. In: Proceedings of the 2010 ACM workshop on Cloud computing security workshop, pp. 65–76, (2010)
  14. Kumar, V.; Kumar, R.; Pandey, S.: Polynomial based noninteractive session key computation protocol for secure communication in dynamic groups. Int. J. Inf. Technol. 12(1), 283–288 (2020)
  15. Sarvabhatla, M.; Reddy, M. C. M.; Vorugunti, C. S.: A robust remote user authentication scheme resistant to known session specific temporary information attack. In: 2015 Applications and innovations in mobile computing (AIMoC), pp. 164–169, IEEE, (2015)
  16. Salem, M. B.; Hershkop, S.; Stolfo, S. J.: A survey of insider attack detection research. In: Insider attack and cyber security. pp. 69–90, Springer, Berlin (2008)
  17. Alsalhi, I. N., Albermany, S. A.: Authentication of crns by using ban logic
  18. Kilinc, H.H.; Yanik, T.: A survey of sip authentication and key agreement schemes. IEEE Commun. Surv. Tutor. 16(2), 1005–1023 (2013)

Downloads

Published

2021-06-30

Issue

Section

Research Articles

How to Cite

[1]
Rajesh Gundla, Sunil Gupta, C. Srinivasa Kumar, " A Three-Party Cloud Authentication Framework for Enhanced Security and Integrity, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 8, Issue 3, pp.581-593, May-June-2021.