Visible to the public An approach of dredging the interconnected nodes and repudiating attacks in cloud network

TitleAn approach of dredging the interconnected nodes and repudiating attacks in cloud network
Publication TypeConference Paper
Year of Publication2017
AuthorsMasood, Raziqa, Pandey, Nitin, Rana, Q. P.
Conference Name2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON)
Date Publishedoct
Keywordsauthentication, authorisation, Authorization, Cancer, cloud computing, cloud computing environment, cloud computing network, cloud data transmission, cloud environment, cloud networks attack, cloud service providers, composability, cryptographic protocols, cryptography, data privacy, interconnected nodes, malignant nodes, mallicious nodes, Metrics, Peer-to-peer computing, privacy, Probabilistic logic, probability, Protocols, pubcrawl, repudiating attacks, Resiliency, secure transaction, security attacks, security challenges, security mechanisms, security models, telecommunication security, white box cryptography
AbstractIn cloud computing environment, there are malignant nodes which create a huge problem to transfer data in communication. As there are so many models to prevent the data over the network, here we try to prevent or make secure to the network by avoiding mallicious nodes in between the communication. So the probabiliostic approach what we use here is a coherent tool to supervise the security challenges in the cloud environment. The matter of security for cloud computing is a superficial quality of service from cloud service providers. Even, cloud computing dealing everyday with new challenges, which is in process to well investigate. This research work draws the light on aspect regarding with the cloud data transmission and security by identifying the malignanat nodes in between the communication. Cloud computing network shared the common pool of resources like hardware, framework, platforms and security mechanisms. therefore Cloud Computing cache the information and deliver the secure transaction of data, so privacy and security has become the bone of contention which hampers the process to execute safely. To ensure the security of data in cloud environment, we proposed a method by implementing white box cryptography on RSA algorithm and then we work on the network, and find the malignant nodes which hampering the communication by hitting each other in the network. Several existing security models already have been deployed with security attacks. A probabilistic authentication and authorization approach is introduced to overcome this attack easily. It observes corrupted nodes before hitting with maximum probability. here we use a command table to conquer the malignant nodes. then we do the comparative study and it shows the probabilistic authentication and authorization protocol gives the performance much better than the old ones.
DOI10.1109/UPCON.2017.8251021
Citation Keymasood_approach_2017