Secure Authentication of Cloud Data Mining API

Cloud computing is a revolutionary concept that has brought a paradigm shift in the IT world. This has made it possible to manage and run businesses without even setting up an IT infrastructure. It offers multi-fold benefits to the users moving to a cloud, while posing unknown security and privacy issues. User authentication is one such growing concern and is greatly needed in order to ensure privacy and security in a cloud computing environment. This paper discusses the security at different levels viz. network, application and virtualization, in a cloud computing environment. A security framework based on one-time pass key mechanism has been proposed. The uniqueness of the proposed security protocol lies in the fact, that it provides security to both the service providers as well the users in a highly conflicting cloud environment.

[1]  G. Mathew Elements of application security in the cloud computing environment , 2012, 2012 IEEE Conference on Open Systems.

[2]  Vijay K. Naik,et al.  Network-Level Access Control Management for the Cloud , 2013, 2013 IEEE International Conference on Cloud Engineering (IC2E).

[3]  Dan Boneh,et al.  TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .

[4]  Liang Xue,et al.  Business Process Centric Platform-as-a-Service Model and Technologies for Cloud Enabled Industry Solutions , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[5]  Timothy Grance,et al.  Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .

[6]  Wei Sun,et al.  Design Aspects of Software as a Service to Enable E-Business through Cloud Platform , 2010, 2010 IEEE 7th International Conference on E-Business Engineering.

[7]  Matt Bishop,et al.  Storm Clouds Rising: Security Challenges for IaaS Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.

[8]  Anoop Gupta,et al.  Designing and deploying an information awareness interface , 2002, CSCW '02.

[9]  Dana Petcu,et al.  Towards a Cross Platform Cloud API - Components for Cloud Federation , 2011, CLOSER.

[10]  Sugata Sanyal,et al.  Security Scheme for Distributed DoS in Mobile Ad Hoc Networks , 2010, ArXiv.

[11]  Tao Chen,et al.  A System for Parallel Data Mining Service on Cloud , 2012, 2012 Second International Conference on Cloud and Green Computing.

[12]  Udo Bub,et al.  Platform-as-a-Service for business customers , 2010, 2010 14th International Conference on Intelligence in Next Generation Networks.

[13]  Wei-bang Chen,et al.  A Data Mining Method to Extract and Rank Papers Describing Coexpression Predicates Semantically , 2009, 2009 IEEE International Conference on Data Mining Workshops.

[14]  Christoph Meinel,et al.  Infrastructure as a service security: Challenges and solutions , 2010, 2010 The 7th International Conference on Informatics and Systems (INFOS).

[15]  Maneesha Sharma,et al.  Cloud Computing: Different Approach & Security Challenge , 2012 .

[16]  Kishor S. Trivedi,et al.  Quantifying Resiliency of IaaS Cloud , 2010, SRDS.

[17]  Sugata Sanyal,et al.  A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks , 2010, ArXiv.

[18]  Sugata Sanyal,et al.  SCIDS: A Soft Computing Intrusion Detection System , 2004, IWDC.

[19]  Marios D. Dikaiakos,et al.  Cloud Computing: Distributed Internet Computing for IT and Scientific Research , 2009, IEEE Internet Computing.

[20]  Dharma P. Agrawal,et al.  Jigsaw-based secure data transfer over computer networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[21]  Inderveer Chana,et al.  Advance Billing and Metering Architecture for Infrastructure as a Service , 2013, CloudCom 2013.

[22]  Wei-Tek Tsai,et al.  SaaS performance and scalability evaluation in clouds , 2011, Proceedings of 2011 IEEE 6th International Symposium on Service Oriented System (SOSE).

[23]  Robert Vrbić Data Mining and Cloud Computing , 2012 .

[24]  Costas Lambrinoudakis,et al.  Cryptography Goes to the Cloud , 2011, STA Workshops.

[25]  Luis M. Vaquero EduCloud: PaaS versus IaaS Cloud Usage for an Advanced Computer Science Course , 2011, IEEE Transactions on Education.

[26]  Sugata Sanyal,et al.  RISM - Reputation Based Intrusion Detection System for Mobile Ad hoc Networks , 2013, ArXiv.

[27]  G. Geetha Kumari,et al.  API access control in cloud using the Role Based Access Control Model , 2010, Trendz in Information Sciences & Computing(TISC2010).

[28]  Xiaoyun Wang,et al.  How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.

[29]  Sugata Sanyal,et al.  CompChall: addressing password guessing attacks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[30]  Sugata Sanyal,et al.  The N/R one time password system , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[31]  Yi Ding,et al.  Network security for virtual machine in cloud computing , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.

[32]  Feng Liu,et al.  SaaS Integration for Software Cloud , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[33]  Sugata Sanyal,et al.  A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security , 2011, ArXiv.

[34]  Fen Zhou,et al.  The Application of SaaS-Based Cloud Computing in the University Research and Teaching Platform , 2011, 2011 International Conference on Intelligence Science and Information Engineering.

[35]  Lingdi Ping,et al.  Trust Model to Enhance Security and Interoperability of Cloud Environment , 2009, CloudCom.