Strong authentication framework using statistical approach for cloud environments

Security is one of the important challenges faced by cloud computing. There are so many methods like encryption, firewall, and providing access control to achieve security. These methods alone cannot provide a flawless access to the available resources. We are in need of a paradigm that permits only authenticated users to access the resources from the cloud. The objective of the proposed paradigm is to provide a strong authentication. Our proposed method considers only the appropriate parameters from the available plenty of parameters, which is used to prove a user to be an authenticated person. The selection of the required parameters is achieved using Principle Component Analysis, then Support Vector Machine classifies accurately the authenticated and unauthenticated users. The simulation result shows that our proposed paradigm achieves high security. We compute our paradigm with various evaluation metrics and we compared with similar models like Support Vector Machine and Artificial Neural Networks. We got great improvement. In order to reduce the complexity, the number of parameters is reduced because, if the parameters are huge, the algorithm prediction will be more complex, which leads to false negatives.

[1]  Rajendra Prasad,et al.  Comparison of support vector machine, artificial neural network, and spectral angle mapper algorithms for crop classification using LISS IV data , 2015 .

[2]  Sabyasachi Patra,et al.  Machine Learning Approach for Intrusion Detection on Cloud Virtual Machines , 2013 .

[3]  Vladimir Cherkassky,et al.  The Nature Of Statistical Learning Theory , 1997, IEEE Trans. Neural Networks.

[4]  Rajiv Gandhi Salai,et al.  Virtual Host based Intrusion Detection System for Cloud , 2014 .

[5]  Namita Parati,et al.  Intrusion Detection System Using Support Vector Machine , 2013 .

[6]  Timothy W. Finin,et al.  SMART : An SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks , 2011 .

[7]  Salvatore J. Stolfo,et al.  Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[8]  S. K. Shrivastava,et al.  Intrusion Detection System based on SVM and Bee Colony , 2015 .

[9]  Václav Snásel,et al.  Using SVM and Clustering Algorithmsin IDS Systems , 2011, DATESO.

[10]  Bharat K. Bhargava,et al.  On the Security of Data Access Control for Multiauthority Cloud Storage Systems , 2017, IEEE Transactions on Services Computing.

[11]  Ravi Raj Choudhary,et al.  A review paper on IDS classification using KDD 99 and NSL KDD dataset in WEKA , 2017, 2017 International Conference on Computer, Communications and Electronics (Comptelix).

[13]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[14]  David M. Nicol,et al.  Trust mechanisms for cloud computing , 2013, Journal of Cloud Computing: Advances, Systems and Applications.

[15]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.