Strong Authentication Framework For Cloud Environments
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
Although there are several advantages, some
newlineobstacles limit the use of cloud computing. One of the crucial issues to
newlineconsider when adopting cloud is security.
newlineThe cloud environment should be developed such that to ensure
newlinesafety and security. In the absence of initial client-side server
newlineinvestments and low cost on the provider side, eliminating security
newlineproblems and providing a strong authentication framework, it will be
newlineamong the most successful paradigms. In this research work, a new
newlineframework has been proposed for enhancement of the access control
newlinemechanism that only allows authenticated users.
newlineThe researcherand#8223;s proposed infrastructure provides strong
newlineauthentication to control access to resources. Strong authentication goes
newlinethrough what you know (User name, password), what you have (NTP
newlineserver session key) and what you are (biometric). By the combination of
newlinepassword-based, biometric-based, and time-based authentication, this
newlineframework provides Type 1, 2 and 3 authentications that accurately
newlineidentify the true positive, with less complexity. The framework manages
newlineerrors from network delays and jitter. It increases security by
newlineeliminating false negatives.
newlinevi
newlineThe proposed methodology for the research takes into
newlineconsideration only the relevant appropriate parameters among the
newlinemultitude of the given parameters, which enable proof for a user as an
newlineauthenticated person. The criterion for selecting the suitable parameters
newlineis the use of PCA (Principal Component Analysis). PCA technique is
newlineused for reducing the dimensionality of a multivariate dataset with
newlineminimal loss of information. Log details maintained in the server are
newlineused for avoiding degradation in the system performance and
newlinemonitoring critical events. The number of login attempts failed prevents/
newlinereduces the data thefts. So in this work, it is given topmost priority for
newlineauthentication.
newlineIn the researcherand#8223;s work, from the available supervised learning
newlinealgorithms, SVM (Support Vector Machine) is used to classify
newlineauthenticated and unauthenticated users accurately. SVM