scispace - formally typeset
Open Access

DPCA: Dual Phase Cloud Infrastructure Authentication

R. Thandeeswaran, +1 more
- Vol. 8, Iss: 3
Reads0
Chats0
TLDR
DPCA is proposed, an authentication at two different phases, where only man is allowed to access the cloud resources, he is authenticated with Dempster Shafter hypothetical approach combined with the user intent and not the content.
Abstract
Every user appreciates the security of their datairrespective of its sensitivity. At the same time, user does not wantto be held up with the legacy systems, which may be stronglysecured but not with fantasy. Network travelled many phases of itsown such as internet, intranet, wireless network, sensor network,Ad-hoc network, Mobile network, Blue-tooth, Cloud and IoT, themost popular technique now. Hence, whatever the type of networkhitting the end user with improvised quality, get compromised insecurity.People feel pleasure upon sharing their moments with theirconnections. Huge amount of data are in transit either by means ofstoring them in cloud or retrieving. Users lose control over theirdata, they are unaware about the people accessing and modifying.Hence DataCentres have to be protected from unauthorized illegalaccess. Illegal data access may be initiated by a boot or a bot. Manor a Machine discrimination has been resolved with CAPTCHA.This paper, DPCA, proposes an authentication at two differentphases. In the first phase, the user is authenticated with the newtype of CAPTCHA. With this methodology, user is segregated asman or machine. Thereby bot-nets are filtered out and the floodingmessages from bots are mitigated. In the second phase, where onlyman is allowed to access the cloud resources, he is authenticatedwith Dempster Shafter hypothetical approach combined with theuser intent and not the content. DPCA has been tested in theinfrastructure and the experimental results proved the strength ofthe algorithm.

read more

Citations
More filters

Securing One Time Password (OTP) for Multi-Factor Out-of-Band Authentication through a 128-bit Blowfish Algorithm

TL;DR: An innovative modification of the Blowfish algorithm designed to capitalize on its strengths but supports 128-bits block size text input using dynamic selection encryption method and reduction of cipher function execution through randomly determined rounds is introduced.

Attacking AES-Masking Encryption Device with Correlation Power Analysis

TL;DR: The use of encoding with one-hot masking technique does not provide the maximum countermeasure effect against CPA-based attacks, and CPA attack can be successfully revealing the AES secret-key.

A Comprehensive Cloud Security Model with Enhanced Key Management, Access Control and Data Anonymization Features

TL;DR: This work formalizes a new key management scheme, called Symmetric Chaos Based key Management (SCBKM), and gives a secure construction of a SCBkM scheme called AS-Chaos, which is an efficient approach for fine-grained encryption-based access control for data stored in untrusted cloud storage.

SRAD: Smart Routing Algorithm Design for Supporting IoT Network Architecture

TL;DR: An algorithm based on Mesh Network Topological Optimization and Routing (MENTOR)-II was called “Smart MENTOR-II” and simulation results show that, in almost all test cases, the proposed algorithm yields lower installation cost and delay constraints than the ordinary MENTor-II.
Journal ArticleDOI

Attacking AES-Masking Encryption Device with Correlation Power Analysis

TL;DR: In this article , the authors analyze CPA on encryption device that has been given logic level countermeasure and find that the use of encoding with one-hot masking technique does not provide the maximum countermeasures against CPA-based attacks.
References
More filters
Book

A mathematical theory of evidence

Glenn Shafer
TL;DR: This book develops an alternative to the additive set functions and the rule of conditioning of the Bayesian theory: set functions that need only be what Choquet called "monotone of order of infinity." and Dempster's rule for combining such set functions.
Book

Wireless Sensor Networks: Current Status and Future Trends

TL;DR: Basic information on wireless sensor networks, current and emerging trends in research and development, as well as future expectations for relevant areas are presented.
Journal ArticleDOI

Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems

TL;DR: A novel family of graphical password systems built on top of Captcha technology, which is called Captcha as graphical passwords (CaRP), which offers reasonable security and usability and appears to fit well with some practical applications for improving online security.
Proceedings ArticleDOI

Multi-level authentication technique for accessing cloud services

TL;DR: The strict authentication system is presented by introducing the multi-level authentication technique which generates/authenticates the password in multiple levels to access the cloud services.
Proceedings ArticleDOI

Multi-factor Authentication Framework for Cloud Computing

TL;DR: The proposed framework provides a feasible and a most efficient mechanism which can closely integrate with the traditional authentication system and shows the close agreement with the standard criteria for security.
Related Papers (5)