Strong Authentication Framework For Cloud Environments

dc.contributor.guideAndrews,J
dc.coverage.spatial
dc.creator.researcherNALINI,S
dc.date.accessioned2021-01-05T11:37:23Z
dc.date.available2021-01-05T11:37:23Z
dc.date.awarded2020
dc.date.completed2019
dc.date.registered2013
dc.description.abstractAlthough there are several advantages, some newlineobstacles limit the use of cloud computing. One of the crucial issues to newlineconsider when adopting cloud is security. newlineThe cloud environment should be developed such that to ensure newlinesafety and security. In the absence of initial client-side server newlineinvestments and low cost on the provider side, eliminating security newlineproblems and providing a strong authentication framework, it will be newlineamong the most successful paradigms. In this research work, a new newlineframework has been proposed for enhancement of the access control newlinemechanism that only allows authenticated users. newlineThe researcherand#8223;s proposed infrastructure provides strong newlineauthentication to control access to resources. Strong authentication goes newlinethrough what you know (User name, password), what you have (NTP newlineserver session key) and what you are (biometric). By the combination of newlinepassword-based, biometric-based, and time-based authentication, this newlineframework provides Type 1, 2 and 3 authentications that accurately newlineidentify the true positive, with less complexity. The framework manages newlineerrors from network delays and jitter. It increases security by newlineeliminating false negatives. newlinevi newlineThe proposed methodology for the research takes into newlineconsideration only the relevant appropriate parameters among the newlinemultitude of the given parameters, which enable proof for a user as an newlineauthenticated person. The criterion for selecting the suitable parameters newlineis the use of PCA (Principal Component Analysis). PCA technique is newlineused for reducing the dimensionality of a multivariate dataset with newlineminimal loss of information. Log details maintained in the server are newlineused for avoiding degradation in the system performance and newlinemonitoring critical events. The number of login attempts failed prevents/ newlinereduces the data thefts. So in this work, it is given topmost priority for newlineauthentication. newlineIn the researcherand#8223;s work, from the available supervised learning newlinealgorithms, SVM (Support Vector Machine) is used to classify newlineauthenticated and unauthenticated users accurately. SVM
dc.description.note
dc.format.accompanyingmaterialDVD
dc.format.dimensionsA5
dc.format.extent181
dc.identifier.urihttp://hdl.handle.net/10603/310624
dc.languageEnglish
dc.publisher.institutionCOMPUTER SCIENCE DEPARTMENT
dc.publisher.placeChennai
dc.publisher.universitySathyabama Institute of Science and Technology
dc.relation
dc.rightsuniversity
dc.source.universityUniversity
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Information Systems
dc.subject.keywordEngineering and Technology
dc.titleStrong Authentication Framework For Cloud Environments
dc.title.alternative
dc.type.degreePh.D.

Files

Original bundle

Now showing 1 - 5 of 18
Loading...
Thumbnail Image
Name:
10 chapter 5.pdf
Size:
228.98 KB
Format:
Adobe Portable Document Format
Description:
Attached File
Loading...
Thumbnail Image
Name:
11 chapter 6.pdf
Size:
636.88 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
12 chapter 7.pdf
Size:
468.48 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
13 chapter 8.pdf
Size:
532.64 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
14 chapter 9.pdf
Size:
325.11 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.79 KB
Format:
Plain Text
Description: