INFORMATION CHANGE THE WORLD

International Journal of Engineering and Manufacturing(IJEM)

ISSN: 2305-3631 (Print), ISSN: 2306-5982 (Online)

Published By: MECS Press

IJEM Vol.7, No.6, Nov. 2017

EduCloud: A Dynamic Three Stage Authentication Framework to Enhance Security in Public Cloud

Full Text (PDF, 1110KB), PP.12-26


Views:368   Downloads:21

Author(s)

G. Kumaresan, N.P. Gopalan

Index Terms

Cloud Computing;EduCloud;Cloud Service Provider;Security;Authentication

Abstract

Now-a-days, one of the most exciting technology is cloud computing. Accessing dynamically virtualized resources through internet is called as cloud computing. Security and confidentiality are the major concerns in public cloud. Though EduCloud (Educational Cloud) uses public cloud, moving data from one location to another location may lead to risk. Information related to staff, student and management or admin that can be shared in EduCloud, are to be secured in public educational cloud environment. In this scenario, data security is the most critical issue in cloud. But present authentication system available does not provide enough security in public EduCloud. Hence, we propose new authentication framework to enhance security in public educational cloud. The features of various authentication techniques are discussed in this paper and a novel framework is proposed for pubic EduCloud, which provides not only security but also increases the response time. The developed software tool is best suited and provably a secured solution to the public educational cloud environment.

Cite This Paper

G. Kumaresan, N.P. Gopalan,"EduCloud: A Dynamic Three Stage Authentication Framework to Enhance Security in Public Cloud", International Journal of Engineering and Manufacturing(IJEM), Vol.7, No.6, pp.12-26, 2017.DOI: 10.5815/ijem.2017.06.02

Reference

[1]P. Mell T. Grance, “The NIST definition of cloud computing version 15 technical report,” Computer and information Sciences, 53(6), 2009,  pp.1-10.

[2]P. Jain, R. Agrawal, “An improved pre-copy approach for transferring the VM data during the virtual machine migration for the cloud environment,” International journal of engineering and manufacturing, 2016, volume 6, no. 6, pp. 51-60. 

[3]S. Jain, V. Sharma, “Enhanced load balancing approach to optimize the performance of the cloud service using virtual machine migration,” International journal of engineering and manufacturing, 2017, volume 7, no. 1, pp. 41-48.

[4]N.A. Yekini, U.I. Vdoh and F. Doherty, “Open educational resources (OER) for sustainable development using automatic cloud computing system,” International journal of engineering and manufacturing, 2016, volume 6, no. 6, pp. 60-68.

[5]L. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, “A break in the clouds toward a cloud definition,” ACM sigcomm computer communication review, 39, 2009, pp.50-55.

[6]Buyya. R, Yeo, C and Vengopal, S, “Market oriented cloud computing vision, hype, and reality for delivering IT services as computing utilities,” proceedings of the 10th IEEE international conference on high performance computing and communications, 2008,  pp.5-13.

[7]R. Buyya, C. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging IT platforms vision hype and reality for delivering computing as the 5th utility,” Further generation computer systems, 25, 2009, pp.599-616.

[8]S. Subashini, V. Kavitha, “A survery on security issues in service delivery models of cloud computing,” Journal of network and computer applications, 2011, pp.1-11.

[9]Lee Badger, Robert Bohn, Shilong Chu, Mike Hogan, Fang Liu, Viktor Kaufmann and Jian, “Useful information for cloud adopters,” NIST cloud computing program, 2(1), 2011,  pp.1-73.

[10]J. Viega, “Cloud computing and common man,” Computer, 42(8), 2009, pp.106-08.

[11]C. Wang, et al., “Ensuring data storage security in cloud computing,” Proceedings of the 2009 17th International Workshop on Quality of Service (IEEE), 2009, pp.1-9.

[12]E. Michael whitman et al., “In defense of the realm: Understanding the threats to information security,” International Journal of Information Management, 24, 2004, pp. 43-57.

[13]Dimitrios Zissis , Dimitrios Lekkas, “Addressing cloud com-putting security issues,” Future Generation Computer Systems, 28, 2012, pp.583-592.

[14]Prachi Soni, Monali Sahoo, “Multi Factor Authentication Security Framework in Cloud Computing,” International Journal of Advanced Research in Computer Science and Software Engineering, January 2015, volume 5, issue 1, pp. 1065-1071.

[15]Chander Kant, Yogesh Sharma, “Enhanced Security Architecture for Cloud Data Security,” International Journal of Advanced Research in Computer Science and Software Engineering, May 2013, volume 3, issue 5, pp. 570-575.

[16]Paolo Cemim et al., “EduCloud: A Private Cloud Tool for Academic Environment,” IEEE Latin America Conference on Cloud Computing and Communications, 2012, pp. 66-71.

[17]Rajesh R, Jaya Lakshmi A, “Optimized and Secured EduClouds by Implementing Virtualization,” International Journal of Electronics and Computer Science Engineering, 2014, volume 1, pp. 2404-2408.

[18]Rohitash Kumar Banyal, Pragya Jain, Vijendra Kumar Jain, “Multi factor authentication framework for cloud computing,” in 5th  international conference on computational intelligence, modelling and simulation 2013, pp.105-110.

[19]Bariah Aljebreen, Ajantha Dahanayake and Liyakathunisa Syed, “Advances in higher educational resource sharing and cloud services,” International journal of computer science and engineering, June 2015, volume 6, no. 3, pp. 27-42.

[20]Omondi John Opala, Syed M. Rahman, “An Exploratory Analysis of the influence of information security on the Adoption of cloud computing,” IEEE international conference on system of system engineering, June 2013, pp. 165-170.

[21]Benjamin Fabian, Annika Baumann and Jessika Lackner, “ Topological analysis of cloud service connectivity,” International journal of computers and industrial engineering, June 2015, pp. 1-34.

[22]Ashishkumar Singh et al., “CAESAR CLOUD: A comprehensive approach for enhancing security and service availability based on reputation for cloud user environment,” International journal of network security and its applications, 2014, pp. 2164-2175.

[23]A.M. Mansuri, Pradeep laxkar and Manish verma, “Benefit of cloud computing for educational institutions and online marketing,” Information security and computer fraud, 2014, volume 2, no. 1, pp. 5-9.

[24]Ali Shahbazi et al., “A distributed key based security framework for private clouds,” International journal of advanced computer science and applications, 2013, volume 4, no. 9, pp. 79-83.

[25]Mary jane sule, “A conceptual framework of deploying cloud IaaS in higher educational institutions,” IEEE international conference on cloud computing technology and science, 2011, pp. 489-493.

[26]Shanto, Mahmud Hossain, “Security threats in cloud computing: A four module approach to secure cloud from DOS attacks in virtual machine,” 2014, pp. 21-25.

[27]G. Kumaresan, N. Veeraragavan and L. Arockiam, “A dynamic two stage authentication framework to enhance security in public educloud,” International journal of applied engineering research, 2015, volume 10, no. 82, pp. 126-131.

[28]G. Kumaresan, N. Veeraragavan and L. Arockiam, “A study of user authentication techniques in cloud computing ,” Journal of emerging technologies and innovative research, 2015, volume 2, no. 8, pp. 3309-3314.