scholarly journals Security Provision in The Cloud Agent Architecture for Efficient User Authentication for Cloud Communication

Author(s):  
S. Saritha

Agent?based Inter Cloud monetary model for reinforcing customer- to-cloud course of action and cloud to cloud trade was first raised, this work offers a response for this new and testing issue by detailing 1) novel shows that demonstrate the guidelines of relationship between purchaser subject matter experts and Cloud administrators, and among Cloud administrators, and 2) novel frameworks that oversee client administrators and Cloud experts in making the best decisions. First the customer needs to move their records into cloud. On that time cloud expert community as of now buy a space from cloud, by then the CSP(Cloud Service Provider) gives the customer name and secret key to buyer. Every Entity is independently checked by the verification. After the effective confirmation of client, the Cloud Agent set up a Secure Communication Protocol between the Client and Provider. The Data is shipped off the cloud specialist for check and approval. When the Cloud Agent, Authorizes the information it is shipped off the cloud for capacity. The Cloud Agent is likewise allotted with proficient checking of dynamic assets. Each customer can introduce its organization sales to various fogs and each cloud can recognize requests from various clients, Many-to-various game plan model for trading cloud resources. It contains purchaser specialists and cloud provider administrators following up to support customers and fogs independently. In a cloud market, PAs deal with CAs to develop organization level Agreement for satisfying organization necessities from consumers.

Author(s):  
Rani Kumari ◽  
Parma Nand ◽  
Suneet Chaudhary

Today millions of ordinary citizens are using networks for banking, shopping and filing their tax return. Network security has become a massive problem. All this requires network to identify its legal users for providing services. An authentication protocol used is Kerberos which uses strong secret key for user authentication but it is vulnerable in case of weak passwords. Authentication  & key distribution protocols requires sharing secret key(s) with a view that only the concerned users know to derive the information from it. These protocols are vulnerable to key guessing attacks. Another important consideration is perfect forward secrecy in which our proposed scheme cover cases with application servers, authentication servers or clients key are revealed & their combination. In this paper our proposed scheme deal with key guessing attacks, perfect forward secrecy and protocols for few combinations of keys. All these protocols are based on the fact that the keys are weak & can be exploited easily.


2005 ◽  
Vol 1 (3-4) ◽  
pp. 345-354 ◽  
Author(s):  
Dibyendu Chakrabarti ◽  
Subhamoy Maitra ◽  
Bimal Roy

Key pre-distribution is an important area of research in Distributed Sensor Networks (DSN). Two sensor nodes are considered connected for secure communication if they share one or more common secret key(s). It is important to analyse the largest subset of nodes in a DSN where each node is connected to every other node in that subset (i.e., the largest clique). This parameter (largest clique size) is important in terms of resiliency and capability towards efficient distributed computing in a DSN. In this paper, we concentrate on the schemes where the key pre-distribution strategies are based on transversal design and study the largest clique sizes. We show that merging of blocks to construct a node provides larger clique sizes than considering a block itself as a node in a transversal design.


Electronics ◽  
2021 ◽  
Vol 10 (9) ◽  
pp. 1031
Author(s):  
Maryam Nasri ◽  
Herbert L. Ginn ◽  
Mehrdad Moallem

This paper presents the implementation of an agent-based architecture suitable for the coordination of power electronic converters in stand-alone microgrids. To this end, a publish-subscribe agent architecture was utilized as a distributed microgrid control platform. Over a distributed hash table (DHT) searching overlay, the publish-subscribe architecture was identified based on a numerical analysis as a scalable agent-based technology for the distributed real-time coordination of power converters in microgrids. The developed framework was set up to deploy power-sharing distributed optimization algorithms while keeping a deterministic time period of a few tens of milliseconds for a system with tens of converters and when multiple events might happen concurrently. Several agents participate in supervisory control to regulate optimum power-sharing for the converters. To test the design, a notional shipboard system, including several converters, was used as a case study. Results of implementing the agent-based publish-subscribe control system using the Java Agent Development Framework (JADE) are presented.


2019 ◽  
Vol 11 (17) ◽  
pp. 4679
Author(s):  
Carina Anderson ◽  
Robert Passey ◽  
Jeremy De Valck ◽  
Rakibuzzaman Shah

This paper reports on a case study of the community group Zero Emissions Noosa, whose goal is for 100% renewable electricity in the Noosa Shire (Queensland, Australia) by 2026. Described within this paper are the processes used by Zero Emissions Noosa to set up their zero emissions plan, involving community engagement and the use of an external consultant. The external consultant was employed to produce a detailed report outlining how to successfully achieve zero emissions from electricity in the Noosa Shire by 2026. This paper explains how and why the community engagement process used to produce the report was just as important as the outcomes of the report itself. Modeling was undertaken, and both detailed and contextual information was provided. Inclusion of the community in developing the scenario parameters for the modeling had a number of benefits including establishing the context within which their actions would occur and focusing their efforts on options that were technically feasible, financially viable and within their capabilities to implement. This provided a focal point for the community in calling meetings and contacting stakeholders. Rather than prescribing a particular course of action, it also resulted in a toolbox of options, a range of possible solutions that is flexible enough to fit into whatever actions are preferred by the community. The approach and outcomes discussed in this paper should, therefore, be useful to other communities with similar carbon emission reduction goals.


2019 ◽  
Vol 9 (22) ◽  
pp. 4956 ◽  
Author(s):  
Xinchao Ruan ◽  
Hang Zhang ◽  
Wei Zhao ◽  
Xiaoxue Wang ◽  
Xuan Li ◽  
...  

We investigate the optical absorption and scattering properties of four different kinds of seawater as the quantum channel. The models of discrete-modulated continuous-variable quantum key distribution (CV-QKD) in free-space seawater channel are briefly described, and the performance of the four-state protocol and the eight-state protocol in asymptotic and finite-size cases is analyzed in detail. Simulation results illustrate that the more complex is the seawater composition, the worse is the performance of the protocol. For different types of seawater channels, we can improve the performance of the protocol by selecting different optimal modulation variances and controlling the extra noise on the channel. Besides, we can find that the performance of the eight-state protocol is better than that of the four-state protocol, and there is little difference between homodyne detection and heterodyne detection. Although the secret key rate of the protocol that we propose is still relatively low and the maximum transmission distance is only a few hundred meters, the research on CV-QKD over the seawater channel is of great significance, which provides a new idea for the construction of global secure communication network.


2020 ◽  
Vol 2 (1) ◽  
pp. 76-81
Author(s):  
Muktar Yahuza ◽  
Yamani Idna Bin Idris ◽  
Ainuddin Wahid Bin Abdul Wahab ◽  
Mahdi A. Musa ◽  
Adamu Abdullahi Garba

Edge computing has significantly enhanced the capabilities of cloud computing. Edge data-centres are used for storing data of the end-user devices. Secure communication between the legitimate edge data-centres during the load balancing process has attracted industrial and academic researchers. Recently, Puthal et al. have proposed a technique for authenticating edge datacenters to enable secure load balancing. However, the resource-constraint nature of the edge data-centres is ignored. The scheme is characterized by complex computation and memory intensive cryptographic protocol. It is also vulnerable to key escrow attack because the secret key used for encrypting and decrypting of the communicated messages is been created by the trusted cloud datacenter. Additionally, the key sharing phase of their algorithm is complex. Therefore, to address the highlighted challenges, this paper proposed a lightweight key escrow-less authentication algorithm that will ensure secure communication of resource-constrained edge data-centres during the load balancing process. The security capability of the proposed scheme has been formally evaluated using the automatic cryptographic analytical tool ProVerif. The relatively low computation and communication costs of the proposed scheme compared to the benchmark schemes proved that it is lightweight, thus suitable for resource-constrained edge datacenters.      


2013 ◽  
pp. 814-834
Author(s):  
Hassan Takabi ◽  
James B.D. Joshi

Cloud computing paradigm is still an evolving paradigm but has recently gained tremendous momentum due to its potential for significant cost reduction and increased operating efficiencies in computing. However, its unique aspects exacerbate security and privacy challenges that pose as the key roadblock to its fast adoption. Cloud computing has already become very popular, and practitioners need to provide security mechanisms to ensure its secure adoption. In this chapter, the authors discuss access control systems and policy management in cloud computing environments. The cloud computing environments may not allow use of a single access control system, single policy language, or single management tool for the various cloud services that it offers. Currently, users must use diverse access control solutions available for each cloud service provider to secure data. Access control policies may be composed in incompatible ways because of diverse policy languages that are maintained separately at every cloud provider. Heterogeneity and distribution of these policies pose problems in managing access policy rules for a cloud environment. In this chapter, the authors discuss challenges of policy management and introduce a cloud based policy management framework that is designed to give users a unified control point for managing access policies to control access to their resources no matter where they are stored.


Author(s):  
Sanjay P. Ahuja ◽  
Thomas F. Furman ◽  
Kerwin E. Roslie ◽  
Jared T. Wheeler

There are several public cloud providers that provide service across different cloud models such as IaaS, PaaS, and SaaS. End users require an objective means to assess the performance of the services being offered by the various cloud providers. Benchmarks have typically been used to evaluate the performance of various systems and can play a vital role in assessing performance of the different public cloud platforms in a vendor neutral manner. Amazon's EC2 Service is one of the leading public cloud service providers and offers many different levels of service. The research in this chapter focuses on system level benchmarks and looks into evaluating the memory, CPU, and I/O performance of two different tiers of hardware offered through Amazon's EC2. Using three distinct types of system benchmarks, the performance of the micro spot instance and the M1 small instance are measured and compared. In order to examine the performance and scalability of the hardware, the virtual machines are set up in a cluster formation ranging from two to eight nodes. The results show that the scalability of the cloud is achieved by increasing resources when applicable. This chapter also looks at the economic model and other cloud services offered by Amazon's EC2, Microsoft's Azure, and Google's App Engine.


2015 ◽  
pp. 2022-2032
Author(s):  
Bina Ramamurthy

In this chapter, the author examines the various approaches taken by the popular cloud providers Amazon Web Services (AWS), Google App Engine (GAE), and Windows Azure (Azure) to secure the cloud. AWS offers Infrastructure as a Service model, GAE is representative of the Software as a Service, and Azure represents the Platform as a Service model. Irrespective of the model, a cloud provider offers a variety of services from a simple large-scale storage service to a complete infrastructure for supporting the operations of a modern business. The author discusses some of the security aspects that a cloud customer must be aware of in selecting a cloud service provider for their needs. This discussion includes the major threats posed by multi-tenancy in the cloud. Another important aspect to consider in the security context is machine virtualization. Securing these services involves a whole range of measures from access-point protection at the client end to securing virtual co-tenants on the same physical machine hosted by a cloud. In this chapter, the author highlights the major offerings of the three cloud service providers mentioned above. She discusses the details of some important security challenges and solutions and illustrates them using screen shots of representative security configurations.


Sign in / Sign up

Export Citation Format

Share Document