• #0 (no title)
  • #0 (no title)
  • About
  • Facebook
  • Twitter
  • RSS
(As ISO 9001:2015 Certified Publications)
    • Quick Search
    • Advanced Search
  • Home
  • Editorial Policy
  • Author Guidelines
  • Submission
  • Copyright Form
  • Career
  • Contact us
  • Subscription

Back to Journal

Home»Articles»Virtual Private Cloud and Authentication: A Review

JournalCover

Asian Journal of Computer Science and Technology (AJCST)

Editor Dr. K. Ganesh
Print ISSN : 2249-0701
Frequency : Quarterly

Virtual Private Cloud and Authentication: A Review

Author : GauravDeep , Rajni Mohana and Paramroop Kaur
Volume 7 No.2 July-September 2018 pp 101-106

Abstract

Cloud computing can be called as service through which computer resources could be used online. It helps to eliminate the need of usage of physical hardware rather it offers to use them on the cloud server. Different Types of cloud service models and deployment models make the cloud access to its users. The cloud supports characteristic such as on demand services, resource pooling, elasticity .While authentication plays important role in the security as it protects the data from the unauthorized people and helps to achieve trust between the service provider and the user. In this Paper, we’ve reviewed the existing work so as tounderstand the concept of cloud computing, virtual private cloud and proposed a multifactor authentication technique which uses biometric trait along with the identity password and MAC address as its factors.

Keywords

Cloud Computing, Authentication, Encryption,Virtual Private Cloud and Validation Tools for security protocols

Full Text:

References

[1] S. K. Naresh and P.C.P Bhatt, “ Cloud Computing: Concepts and Practices”, Springer, 2018.

[2] M. Michel, Serres, O., Anbar, A., Golden, E. J., and El-Ghazawi, T.,”Open Source Private Cloud Platforms for Big Data”, In Big Data Analytics for Sensor-Network Collected Intelligence, pp. 63-80, 2017.

[3] M. Almubaddel, and Elmogy, A. M.,”Cloud computing antecedents, challenges, and directions”, In Proceedings of the International Conference on Internet of things and Cloud Computing, ACM,p. 16, 2016.

[4] Bhardwaj, Subrahmanyam, G. V. B., Avasthi, V., and Sastry, H.,”Security algorithms for cloud computing”, Procedia Computer Science, vol85, pp: 535-542, 2016.

[5] V. Lozupone, “Analyze encryption and public key infrastructure (PKI)”, International Journal of Information Management, vol. 38, no. 1, pp. 42-44, 2018.

[6] Palomares, D., Migault, D., Hendrik, H., Laurent, M., &Pujolle, G.,”Elastic virtual private cloud”, In Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks (pp. 127-131).ACM, 2014.

[7] T.Wood, Shenoy, P. J., Gerber, A., van der Merwe, J. E., and Ramakrishnan, K. K, “The Case for Enterprise-Ready Virtual Private Clouds”, In HotCloud.2009.

[8] L.Coppolino, D’Antonio, S., Mazzeo, G., andRomano, L.,”Cloud security: Emerging threats and current solutions”, Computers & Electrical Engineering, vol59, pp-126-140, 2017.

[9] B.Rad, B., Diaby, T., and Rana, M. E,”Cloud computing adoption: a short review of issues and challenges”, In Proceedings of the 2017 International Conference on E-commerce, E-Business and E-Government, ACM, pp. 51-55,2017.

[10] A.Armando, Basin, D., Boichut, Y., Chevalier, Y.,Compagna, L., Cuéllar, J., and Mödersheim, S.,” The AVISPA tool for the automated validation of internet security protocols and applications”.In International conference on computer aided verification (pp. 281-285). Springer, Berlin, Heidelberg, 2005.

[11] M.Moran, and Wallach, D. S.,” Verification of STAR-Vote and Evaluation of FDR andProVerif”, In International Conference on Integrated Formal Methods, Springer, Cham, pp. 422-436, 2017.

[12] C.J. Cremers, “The scyther tool: Verification, falsification, and analysis of security protocols”, In International Conference on Computer Aided Verification, Springer, Berlin, Heidelberg.(pp. 414-418), 2008.

[13] D.Houcque,”Introduction to Matlab for engineering students”, Northwestern University, pp. 1-64, 2005.

[14] R.Birke, Podzimek, A., Chen, L. Y., and Smirni, E.,”Virtualization in the private cloud: State of the practice”, IEEE Transactions on Network and Service Management, vol13, no. 3,pp. 608-621, 2016.

[15] F. J. Krautheim,”Private Virtual Infrastructure for Cloud Computing”, In HotCloud,2009.

[16] T.Bhatia, and Verma, A. K.,” Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues”, The Journal of Supercomputing, vol. 73, no. 6,pp. 2558-2631, 2017.

[17] Roy,andDasgupta, D.,” A fuzzy decision support system for multifactor authentication”, Soft Computing, pp.1-23, 2017.

[18] J. L.Tsai, and Lo, N. W., “A privacy-aware authentication scheme for distributed mobile cloud computing services”, IEEE systems journal, vol. 9, no. 3,pp. 805-815,2015.

[19] M. A.Nematollahi, Gamboa-Rosales, H., Martinez-Ruiz, F. J., Jose, I., Al-Haddad, S. A. R., and Esmaeilpour, M.,”Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition”, Multimedia Tools and Applications, vol. 76, no. 5,pp. 7251-7281, 2017.

[20] Wu, F., Xu, L., Kumari, S., and Li, X.,”An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks”, Multimedia Systems, vol. 23, no. 2, pp. 195-205, 2017.

[21] S. A.Chaudhry, H.Naqvi, Sher, M., Farash, M. S., and Hassan, M. U.,” An improved and provably secure privacy preserving authentication protocol for SIP”, Peer-to-Peer Networking and Applications, vol. 10,no. 1,pp. 1-15, 2017.

[22] P.,Gope, R. Amin, Islam, S. H., Kumar, N., and Bhalla, V. K.,”Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment”, Future Generation Computer Systems, vol . 83,pp: 629-637, 2018.

[23] A.Irshad,S.Kumari, Li, X., Wu, F., Chaudhry, S. A., andArshad, H. ,”An improved SIP authentication scheme based on server-oriented biometric verification”, Wireless Personal Communications, vol. 97, no. 2,pp. 2145-2166,2017.

[24] Z. Li, X. Zhong, Chen, X., and Liu, J.,”A lightweight hash-based mutual authentication protocol for RFID”, In International Workshop on Management of Information, Processes and Cooperation, Springer, Singapore, pp. 87-98, 2016.

[25] P.Spanaki, and N.Sklavos,”Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts”,In Computer and Network Security Essentials, Springer, Cham,pp. 539-553, 2018.

Asian Journal of Computer Science and Technology is a peer-reviewed international journal that publishes high-quality scientific articles (both theory and practice) and research papers covering all aspects of future computer and Information Technology areas. Topics include, but are not limited to:

Foundations of High-performance ComputingTheory of algorithms and computability

Parallel & distributed computing

Computer networks

Neural networks

LAN/WAN/MAN

Database theory & practice

Mobile Computing for e-Commerce

Future Internet architecture

Protocols and services

Mobile and ubiquitous networks

Green networking

Internet content search

Opportunistic networking

Network applications

Network scaling and limits

Artifial Intelligences

Pattern/Image Recognitions

Communication Network

Information Security

Knowledge Management

Management Information systems

Multimedia communicatiions

Operations research

Optical networks

Software Engineering

Virtual reality

Web Technologies

Wireless technology

Cloud computing can be called as service through which computer resources could be used online. It helps to eliminate the need of usage of physical hardware rather it offers to use them on the cloud server. Different Types of cloud service models and deployment models make the cloud access to its users. The cloud supports characteristic such as on demand services, resource pooling, elasticity .While authentication plays important role in the security as it protects the data from the unauthorized people and helps to achieve trust between the service provider and the user. In this Paper, we’ve reviewed the existing work so as tounderstand the concept of cloud computing, virtual private cloud and proposed a multifactor authentication technique which uses biometric trait along with the identity password and MAC address as its factors.

Editor-in-Chief
Dr. K. Ganesh
Global Lead, Supply Chain Management, Center of Competence and Senior Knowledge
Expert at McKinsey and Company, India
[email protected]
Editorial Advisory Board
Dr. Eng. Hamid Ali Abed AL-Asadi
Department of Computer Science, Basra University, Iraq
[email protected]
Dr. Norjihan Binti Abdul Ghani
Department of Information System, University of Malaya, Malaysia
[email protected]
Dr. Christos Bouras
Department of Computer Engineering & Informatics, University of Patras, Greece
[email protected]
Dr. Maizatul Akmar Binti Ismail
Department of Information System, University of Malaya, Malaysia
[email protected]
Dr. Harold Castro
Department of Systems Engineering and Computing, University of the Andes, Colombia
[email protected]
Dr. Busyairah Binti Syd Ali
Department of Software Engineering, University of Malaya, Malaysia
[email protected]
Dr. Sri Devi Ravana
Department of Information system, University of Malaya, Malaysia
[email protected]
Dr. Karpaga Selvi Subramanian
Department of Computer Engineering, Mekelle University, Ethiopia
[email protected]
Dr. Mazliza Binti Othman
Department of Computer System & Technology, University of Malaya, Malaysia
[email protected]
Dr. Chiam Yin Kia
Department of Software Engineering, University of Malaya, Malaysia
[email protected]
Dr. OUH Eng Lieh
Department of Information Systems, Singapore Management University, Singapore
[email protected]

2016

2015

2014

  • Results
  • Asian Review of Mechanical Engineering (ARME)
  • career

2013

  • Home
  • Shop
  • My Account
  • Logout
  • Contact us
  • The Asian Review of Civil Engineering (TARCE)

2012

  • Asian Journal of Electrical Sciences(AJES)
  • Asian Journal of Computer Science and Technology (AJCST)
  • Asian Journal of Information Science and Technology (AJIST)
  • Asian Journal of Engineering and Applied Technology (AJEAT)
  • Asian Journal of Science and Applied Technology (AJSAT)
  • Asian Journal of Managerial Science (AJMS)
  • Asian Review of Social Sciences (ARSS)

2011

2010

    Table of Contents

    Editorial Note

    Editorial Dr. K. Ganesh

    Editor-in-Chief
    Dr. K. Ganesh
    Global Lead, Supply Chain Management, Center of Competence and Senior Knowledge
    Expert at McKinsey and Company, India
    [email protected]
    Editorial Advisory Board
    Dr. Eng. Hamid Ali Abed AL-Asadi
    Department of Computer Science, Basra University, Iraq
    [email protected]
    Dr. Norjihan Binti Abdul Ghani
    Department of Information System, University of Malaya, Malaysia
    [email protected]
    Dr. Christos Bouras
    Department of Computer Engineering & Informatics, University of Patras, Greece
    [email protected]
    Dr. Maizatul Akmar Binti Ismail
    Department of Information System, University of Malaya, Malaysia
    [email protected]
    Dr. Harold Castro
    Department of Systems Engineering and Computing, University of the Andes, Colombia
    [email protected]
    Dr. Busyairah Binti Syd Ali
    Department of Software Engineering, University of Malaya, Malaysia
    [email protected]
    Dr. Sri Devi Ravana
    Department of Information system, University of Malaya, Malaysia
    [email protected]
    Dr. Karpaga Selvi Subramanian
    Department of Computer Engineering, Mekelle University, Ethiopia
    [email protected]
    Dr. Mazliza Binti Othman
    Department of Computer System & Technology, University of Malaya, Malaysia
    [email protected]
    Dr. Chiam Yin Kia
    Department of Software Engineering, University of Malaya, Malaysia
    [email protected]
    Dr. OUH Eng Lieh
    Department of Information Systems, Singapore Management University, Singapore
    [email protected]

    Articles

Advanced Search

You can submit your research paper to the journal in just a few clicks. Please follow the steps outlined below: 1. Register your details and select to be an Author 2. Log in with your user name and password 3. ‘Start a new submission’ and follow these 5 steps:

[gravityform id="1" name="Registration" title="false" description="false"]

Privacy Statement

The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.

Privacy Statement

The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.

Lorem1 ipsum dolor sit amet, consectetur adipiscing elit. Nulla convallis ultricies scelerisque. Fusce dolor augue, sollicitudin eget lacus vitae, rutrum commodo lacus. Praesent ullamcorper facilisis dui. Sed suscipit id lorem ut dapibus. Integer dictum cursus nisl, quis ullamcorper augue. Sed non rutrum mauris. Maecenas in dolor est. Donec eget sagittis mi. Sed non leo eu odio mollis pulvinar vitae et leo. Integer eu feugiat tortor. Duis massa purus, eleifend id erat eget, hendrerit semper risus. Suspendisse cursus varius dapibus

Lorem1 ipsum dolor sit amet, consectetur adipiscing elit. Nulla convallis ultricies scelerisque. Fusce dolor augue, sollicitudin eget lacus vitae, rutrum commodo lacus. Praesent ullamcorper facilisis dui. Sed suscipit id lorem ut dapibus. Integer dictum cursus nisl, quis ullamcorper augue.

Subscription

Subscription (for 12 issues):
Rs. 5000; Overseas - USD 500;
Cheque drawn in favour of "Informatics Publishing Limited"
Click here to download online subscription form

Download

DD Mailing Address

Lorem1 ipsum dolor sit amet,
Lorem1 ipsum dolor sit amet,
Lorem1 ipsum dolor sit amet.

BACK TO TOP

Outstanding Scholars

The Journals honor Outstanding Scholars in various fields. Scholar of the Month should have contributed to their field and to the larger community. Recipients will be nominated by the Advisory Board and approved by the Editor-in-Chief of the allied journals published by The Research Publication. Scholar of the Month will be displayed in the web portal of the concerned journal.

Please send your brief write up to [email protected]

Editors and Reviewers

The Research Publication is seeking qualified researchers to join its editorial team as Associate Editor, Editorial Advisory Board Member, and Reviewers.
Kindly send your details to [email protected]

Call For Papers

Authors are requested to submit their papers electronically to [email protected] with mentioning the journal title.

Mailing Address

The Research Publication 1/611, Maruthi Nagar, Rakkipalayam Post, Coimbatore – 641 031, Tamil Nadu, India Phone No.: 0422 2461001

  • About
  • Editorial Policy
  • Author Guidelines
  • Contact us
  • Copyright
  • Facebook
  • Twitter
  • RSS

© 2015 The Research Publication. All rights reserved.

The Research Publication
  • Home
  • Editorial Policy
  • Author Guidelines
  • Submission
  • Copyright Form
  • Career
  • Contact us
  • Subscription