A Dynamic Four-Level Authentication Framework to Enhance Security in Public Cloud Using Hybrid Cellular Automata

At present, cloud computing is the biggest mechanism in many applications. It's dynamically accessing virtualized resources across the web. Protection and integrity are the major worries in public cloud. Although educational cloud uses the public cloud, transferring secret information from one location to another location may lead to the threat. Data related to management, staff, student or admin that can be shared in an educational cloud which is protected from cloud. In these circumstances, information protection is the main issue in the cloud. But current authentication systems do not grant sufficient protection in the cloud. Hence, a new authentication framework is proposed in public educational cloud environment. The different authentication mechanisms are explained and novel cellular automata based security framework is proposed in public educational cloud, which provides better protection and boost the response time. The implemented software tool is appropriate and certainly protects the public educational cloud.

[1]  S. Shefali,et al.  CELLULAR AUTOMATA FOR CRYPT-STEGANOGRAPHY , 2013 .

[2]  L. Arockiam,et al.  A Dynamic Two Stage Authentication Framework to Enhance Security in Public EduCloud , 2015 .

[3]  Benjamin Fabian,et al.  Topological analysis of cloud service connectivity , 2015, Comput. Ind. Eng..

[4]  Chander Kant,et al.  Enhanced Security Architecture for Cloud Data Security , 2013 .

[5]  Chun-Ling Chang,et al.  Cellular automata for edge detection of images , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).

[6]  Petre Anghelescu,et al.  FPGA Implementation of Hybrid Additive Programmable Cellular Automata Encryption Algorithm , 2008, 2008 Eighth International Conference on Hybrid Intelligent Systems.

[7]  Gonzalo Álvarez,et al.  Sharing secret color images using cellular automata with memory , 2003, ArXiv.

[8]  L. Arockiam,et al.  A Study of User Authentication Techniques in Cloud Computing , 2015 .

[9]  Tiago Ferreto,et al.  EduCloud: A private cloud tool for academic environments , 2012, 2012 IEEE Latin America Conference on Cloud Computing and Communications (LatinCloud).

[10]  Yuan Zhou,et al.  Encryption Based on Reversible Second-Order Cellular Automata , 2005, ISPA Workshops.

[11]  Anwar Mohd. Mansuri,et al.  Benefit of Cloud Computing for Educational Institutions and Online Marketing , 2014 .

[12]  Ajantha Dahanayake,et al.  Advances in Higher Educational Resource Sharing and Cloud Services for Ksa , 2015 .

[13]  Peter Mell,et al.  "The NIST Definition of Cloud Computing," Version 15 , 2009 .

[14]  Ismail Amr Ismail,et al.  A cryptosystem based on elementary cellular automata , 2013, Commun. Nonlinear Sci. Numer. Simul..

[15]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[16]  Sawan Kumar,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[17]  N. P. Gopalan,et al.  EduCloud: A Dynamic Three Stage Authentication Framework to Enhance Security in Public Cloud , 2017 .

[18]  Syed M. Rahman,et al.  An exploratory analysis of the influence of information security on the adoption of cloud computing , 2013, 2013 8th International Conference on System of Systems Engineering.

[19]  Jahangir Mohammed,et al.  A Cellular Automata based Optimal Edge Detection Technique using Twenty-Five Neighborhood Model , 2013, ArXiv.

[20]  A. Jaya Lakshmi,et al.  Optimized and Secured Educlouds by Implementing Virtualization , 2012 .

[21]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[22]  Lakshmi Sobhana Kalli,et al.  Market-Oriented Cloud Computing : Vision , Hype , and Reality for Delivering IT Services as Computing , 2013 .

[23]  Rohitash Kumar Banyal,et al.  Multi-factor Authentication Framework for Cloud Computing , 2013, 2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation.

[24]  N. P. Gopalan,et al.  An Analytical Study of Cellular Automata and its Applications in Cryptography , 2017 .

[25]  Prachi Soni,et al.  Multi-factor Authentication Security Framework in Cloud Computing , 2015 .

[26]  S. Wolfram,et al.  Two-dimensional cellular automata , 1985 .

[27]  John Viega,et al.  Cloud Computing and the Common Man , 2009, Computer.

[28]  Nureni Asafe Yekini,et al.  Open Educational Resources (OER) for Sustainable Development using Autonomic Cloud Computing System , 2016 .

[29]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[30]  J. Anitha,et al.  International Conference on Intelligent Computing and Control Systems (ICICCS 2018) , 2018, 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS).

[31]  Ziba Eslami,et al.  A verifiable multi-secret sharing scheme based on cellular automata , 2010, Inf. Sci..

[32]  Michael E. Whitman,et al.  In defense of the realm: understanding the threats to information security , 2004, Int. J. Inf. Manag..

[33]  M. A. Peer,et al.  Digital Image Scrambling Based on Two Dimensional Cellular Automata , 2012 .