Virtual Private Cloud and Authentication: A Review

Authors

  • Gaurav Deep Assistant Professor, Department of Computer Engineering, Punjabi University, Patiala, Punjab, India
  • Rajni Mohana Assistant Professor , Jaypee University of Information Technology,Solan, Himachal Pradesh, India
  • Paramroop Kaur PG Student, Department of Computer Engineering, Punjabi University, Patiala, Punjab, India

DOI:

https://doi.org/10.51983/ajcst-2018.7.2.1862

Keywords:

Cloud Computing, Authentication, Encryption, Virtual Private Cloud and Validation Tools for security protocols

Abstract

Cloud computing can be called as service through which computer resources could be used online. It helps to eliminate the need of usage of physical hardware rather it offers to use them on the cloud server. Different Types of cloud service models and deployment models make the cloud access to its users. The cloud supports characteristic such as on demand services, resource pooling, elasticity .While authentication plays important role in the security as it protects the data from the unauthorized people and helps to achieve trust between the service provider and the user. In this Paper, we’ve reviewed the existing work so as tounderstand the concept of cloud computing, virtual private cloud and proposed a multifactor authentication technique which uses biometric trait along with the identity password and MAC address as its factors.

References

S. K. Naresh and P. C. P. Bhatt, "Cloud Computing: Concepts and Practices," Springer, 2018.

M. Michel Serres, O. Anbar, A. Golden, E. J. and T. El-Ghazawi, "Open Source Private Cloud Platforms for Big Data," In Big Data Analytics for Sensor-Network Collected Intelligence, pp. 63-80, 2017.

M. Almubaddel and A. M. Elmogy, "Cloud computing antecedents, challenges, and directions," In Proceedings of the International Conference on Internet of Things and Cloud Computing, ACM, p. 16, 2016.

B. Bhardwaj, G. V. B. Subrahmanyam, V. Avasthi, and H. Sastry, "Security algorithms for cloud computing," Procedia Computer Science, vol. 85, pp: 535-542, 2016.

V. Lozupone, "Analyze encryption and public key infrastructure (PKI)," International Journal of Information Management, vol. 38, no. 1, pp. 42-44, 2018.

D. Palomares, D. Migault, H. Hendrik, M. Laurent, and G. Pujolle, "Elastic virtual private cloud," In Proceedings of the 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks (pp. 127-131). ACM, 2014.

T. Wood, P. J. Shenoy, A. Gerber, J. E. van der Merwe, and K. K. Ramakrishnan, "The Case for Enterprise-Ready Virtual Private Clouds," In HotCloud. 2009.

L. Coppolino, S. D’Antonio, G. Mazzeo, and L. Romano, "Cloud security: Emerging threats and current solutions," Computers & Electrical Engineering, vol. 59, pp-126-140, 2017.

B. Rad, T. Diaby, and M. E. Rana, "Cloud computing adoption: a short review of issues and challenges," In Proceedings of the 2017 International Conference on E-commerce, E-Business and E-Government, ACM, pp. 51-55, 2017.

A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuéllar, and S. Mödersheim, "The AVISPA tool for the automated validation of internet security protocols and applications." In International conference on computer-aided verification (pp. 281-285). Springer, Berlin, Heidelberg, 2005.

M. Moran and D. S. Wallach, "Verification of STAR-Vote and Evaluation of FDR and ProVerif," In International Conference on Integrated Formal Methods, Springer, Cham, pp. 422-436, 2017.

C. J. Cremers, "The scyther tool: Verification, falsification, and analysis of security protocols," In International Conference on Computer Aided Verification, Springer, Berlin, Heidelberg. (pp. 414-418), 2008.

D. Houcque, "Introduction to Matlab for engineering students," Northwestern University, pp. 1-64, 2005.

R. Birke, A. Podzimek, L. Y. Chen, and E. Smirni, "Virtualization in the private cloud: State of the practice," IEEE Transactions on Network and Service Management, vol. 13, no. 3, pp. 608-621, 2016.

F. J. Krautheim, "Private Virtual Infrastructure for Cloud Computing," In HotCloud, 2009.

T. Bhatia and A. K. Verma, "Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues," The Journal of Supercomputing, vol. 73, no. 6, pp. 2558-2631, 2017.

A. Roy and D. Dasgupta, "A fuzzy decision support system for multifactor authentication," Soft Computing, pp. 1-23, 2017.

J. L. Tsai and N. W. Lo, "A privacy-aware authentication scheme for distributed mobile cloud computing services," IEEE Systems Journal, vol. 9, no. 3, pp. 805-815, 2015.

M. A. Nematollahi, H. Gamboa-Rosales, F. J. Martinez-Ruiz, I. Jose, S. A. R. Al-Haddad, and M. Esmaeilpour, "Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition," Multimedia Tools and Applications, vol. 76, no. 5, pp. 7251-7281, 2017.

F. Wu, L. Xu, S. Kumari, and X. Li, "An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks," Multimedia Systems, vol. 23, no. 2, pp. 195-205, 2017.

S. A. Chaudhry, H. Naqvi, M. Sher, M. Farash, and M. Hassan, "An improved and provably secure privacy preserving authentication protocol for SIP," Peer-to-Peer Networking and Applications, vol. 10, no. 1, pp. 1-15, 2017.

P. Gope, R. Amin, S. H. Islam, N. Kumar, and V. K. Bhalla, "Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment," Future Generation Computer Systems, vol. 83, pp: 629-637, 2018.

A. Irshad, S. Kumari, X. Li, F. Wu, S. A. Chaudhry, and H. Arshad, "An improved SIP authentication scheme based on server-oriented biometric verification," Wireless Personal Communications, vol. 97, no. 2, pp. 2145-2166, 2017.

Z. Li, X. Zhong, X. Chen, and J. Liu, "A lightweight hash-based mutual authentication protocol for RFID," In International Workshop on Management of Information, Processes and Cooperation, Springer, Singapore, pp. 87-98, 2016.

P. Spanaki and N. Sklavos, "Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts," In Computer and Network Security Essentials, Springer, Cham, pp. 539-553, 2018.

Downloads

Published

16-08-2018

How to Cite

Deep, G., Mohana, R., & Kaur, P. (2018). Virtual Private Cloud and Authentication: A Review. Asian Journal of Computer Science and Technology, 7(2), 101–106. https://doi.org/10.51983/ajcst-2018.7.2.1862