Low cost robust inter-server authentication for cloud environments

The security of the data is an important issue on cloud environment as it is directly related to the users. Transmission of the data involves various risks and the proposed model will address the issues of the secure data transmission on cloud platforms. For secure data transmission over internet, a security layer has been implemented between the server end and the cloud user. A new scheme includes Key exchange has been implemented to provide the intended security in the cloud and to mitigate those security risks related to the cloud users. Existing authentication algorithms have been improved for the designing of the proposed model. It makes the cloud server nodes and the users will work in secure cloud platform. The proposed scheme has provided better security and improved the performance than any other existing key management technique. The non predictive key generation scheme is used for the key management. The results of the model show how effectively and efficiently the proposed model will works in terms of the elapsed time.

[1]  Raimir Holanda Filho,et al.  WSN Routing: An Geocast Approach for Reducing Consumption Energy , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[2]  Joel J. P. C. Rodrigues,et al.  Testbed-based performance evaluation of routing protocols for vehicular delay-tolerant networks , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[3]  Ilya Mironov,et al.  Publicly Verifiable Secret Sharing for Cloud-Based Key Management , 2011, INDOCRYPT.

[4]  Zubair A. Baig,et al.  Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks , 2016, Comput. Networks.

[5]  Ramaswamy Chandramouli,et al.  Cryptographic Key Management Issues and Challenges in Cloud Services , 2014, Secure Cloud Computing.

[6]  Tian Guan,et al.  Reliable Resource Provision Policy for Cloud Computing , 2010 .

[7]  William B. Davis Graphical Model Theory for Wireless Sensor Networks , 2002 .

[8]  Antonio Puliafito,et al.  Security and Cloud Computing: InterCloud Identity Management Infrastructure , 2010, 2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises.

[9]  Moulay Lahcen Hasnaoui,et al.  Hierarchical adaptive balanced energy efficient routing protocol (HABRP) for heterogeneous wireless sensor networks , 2011, 2011 International Conference on Multimedia Computing and Systems.

[10]  Ernesto Damiani,et al.  Toward Cloud-Based Key Management for Outsourced Databases , 2010, COMPSAC Workshops.

[11]  V. K. Agrawal,et al.  Multi-level authentication technique for accessing cloud services , 2012, 2012 International Conference on Computing, Communication and Applications.

[12]  Ivan Damgård,et al.  Secure Key Management in the Cloud , 2013, IMACC.

[13]  Ashutosh Kumar Dikshit,et al.  Energy Efficient Cluster Based Routing Protocol for wireless sensor networks , 2015, 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).

[14]  N. Suganthi,et al.  Energy Efficient Key Management Scheme for Wireless Sensor Networks , 2014, Int. J. Comput. Commun. Control.

[15]  Jean Frédéric Myoupo,et al.  An Energy-Efficient Clique-Based Geocast Algorithm for Dense Sensor Networks , 2010, Commun. Netw..

[16]  Amani S. Ibrahim,et al.  Collaboration-Based Cloud Computing Security Management Framework , 2011, 2011 IEEE 4th International Conference on Cloud Computing.