Virtual Private Cloud and Authentication: A Review


  • Gaurav Deep Assistant Professor, Department of Computer Engineering, Punjabi University, Patiala, Punjab, India
  • Rajni Mohana Assistant Professor , Jaypee University of Information Technology,Solan, Himachal Pradesh, India
  • Paramroop Kaur PG Student, Department of Computer Engineering, Punjabi University, Patiala, Punjab, India



Cloud Computing, Authentication, Encryption, Virtual Private Cloud and Validation Tools for security protocols


Cloud computing can be called as service through which computer resources could be used online. It helps to eliminate the need of usage of physical hardware rather it offers to use them on the cloud server. Different Types of cloud service models and deployment models make the cloud access to its users. The cloud supports characteristic such as on demand services, resource pooling, elasticity .While authentication plays important role in the security as it protects the data from the unauthorized people and helps to achieve trust between the service provider and the user. In this Paper, we’ve reviewed the existing work so as tounderstand the concept of cloud computing, virtual private cloud and proposed a multifactor authentication technique which uses biometric trait along with the identity password and MAC address as its factors.


S. K. Naresh and P.C.P Bhatt, “ Cloud Computing: Concepts and Practices”, Springer, 2018.

M. Michel, Serres, O., Anbar, A., Golden, E. J., and El-Ghazawi, T.,”Open Source Private Cloud Platforms for Big Data”, In Big Data Analytics for Sensor-Network Collected Intelligence, pp. 63-80, 2017.

M. Almubaddel, and Elmogy, A. M.,”Cloud computing antecedents, challenges, and directions”, In Proceedings of the International Conference on Internet of things and Cloud Computing, ACM,p. 16, 2016.

Bhardwaj, Subrahmanyam, G. V. B., Avasthi, V., and Sastry, H.,”Security algorithms for cloud computing”, Procedia Computer Science, vol85, pp: 535-542, 2016.

V. Lozupone, “Analyze encryption and public key infrastructure (PKI)”, International Journal of Information Management, vol. 38, no. 1, pp. 42-44, 2018.

Palomares, D., Migault, D., Hendrik, H., Laurent, M., &Pujolle, G.,”Elastic virtual private cloud”, In Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks (pp. 127-131).ACM, 2014.

T.Wood, Shenoy, P. J., Gerber, A., van der Merwe, J. E., and Ramakrishnan, K. K, “The Case for Enterprise-Ready Virtual Private Clouds”, In HotCloud.2009.

L.Coppolino, D’Antonio, S., Mazzeo, G., andRomano, L.,”Cloud security: Emerging threats and current solutions”, Computers & Electrical Engineering, vol59, pp-126-140, 2017.

B.Rad, B., Diaby, T., and Rana, M. E,”Cloud computing adoption: a short review of issues and challenges”, In Proceedings of the 2017 International Conference on E-commerce, E-Business and E-Government, ACM, pp. 51-55,2017.

A.Armando, Basin, D., Boichut, Y., Chevalier, Y.,Compagna, L., Cuéllar, J., and Mödersheim, S.,” The AVISPA tool for the automated validation of internet security protocols and applications”.In International conference on computer aided verification (pp. 281-285). Springer, Berlin, Heidelberg, 2005.

M.Moran, and Wallach, D. S.,” Verification of STAR-Vote and Evaluation of FDR andProVerif”, In International Conference on Integrated Formal Methods, Springer, Cham, pp. 422-436, 2017.

C.J. Cremers, “The scyther tool: Verification, falsification, and analysis of security protocols”, In International Conference on Computer Aided Verification, Springer, Berlin, Heidelberg.(pp. 414-418), 2008.

D.Houcque,”Introduction to Matlab for engineering students”, Northwestern University, pp. 1-64, 2005.

R.Birke, Podzimek, A., Chen, L. Y., and Smirni, E.,”Virtualization in the private cloud: State of the practice”, IEEE Transactions on Network and Service Management, vol13, no. 3,pp. 608-621, 2016.

F. J. Krautheim,”Private Virtual Infrastructure for Cloud Computing”, In HotCloud,2009.

T.Bhatia, and Verma, A. K.,” Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues”, The Journal of Supercomputing, vol. 73, no. 6,pp. 2558-2631, 2017.

Roy,andDasgupta, D.,” A fuzzy decision support system for multifactor authentication”, Soft Computing, pp.1-23, 2017.

J. L.Tsai, and Lo, N. W., “A privacy-aware authentication scheme for distributed mobile cloud computing services”, IEEE systems journal, vol. 9, no. 3,pp. 805-815,2015.

M. A.Nematollahi, Gamboa-Rosales, H., Martinez-Ruiz, F. J., Jose, I., Al-Haddad, S. A. R., and Esmaeilpour, M.,”Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition”, Multimedia Tools and Applications, vol. 76, no. 5,pp. 7251-7281, 2017.

Wu, F., Xu, L., Kumari, S., and Li, X.,”An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks”, Multimedia Systems, vol. 23, no. 2, pp. 195-205, 2017.

S. A.Chaudhry, H.Naqvi, Sher, M., Farash, M. S., and Hassan, M. U.,” An improved and provably secure privacy preserving authentication protocol for SIP”, Peer-to-Peer Networking and Applications, vol. 10,no. 1,pp. 1-15, 2017.

P.,Gope, R. Amin, Islam, S. H., Kumar, N., and Bhalla, V. K.,”Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment”, Future Generation Computer Systems, vol . 83,pp: 629-637, 2018.

A.Irshad,S.Kumari, Li, X., Wu, F., Chaudhry, S. A., andArshad, H. ,”An improved SIP authentication scheme based on server-oriented biometric verification”, Wireless Personal Communications, vol. 97, no. 2,pp. 2145-2166,2017.

Z. Li, X. Zhong, Chen, X., and Liu, J.,”A lightweight hash-based mutual authentication protocol for RFID”, In International Workshop on Management of Information, Processes and Cooperation, Springer, Singapore, pp. 87-98, 2016.

P.Spanaki, and N.Sklavos,”Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts”,In Computer and Network Security Essentials, Springer, Cham,pp. 539-553, 2018.




How to Cite

Deep, G., Mohana, R., & Kaur, P. (2018). Virtual Private Cloud and Authentication: A Review. Asian Journal of Computer Science and Technology, 7(2), 101–106.