分布式计算环境下一种高效的云安全监控机制(IJCNIS-V12-N6-5)

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

I.J.ComputerNetworkandInformationSecurity,2020,6,57-77PublishedOnlineDecember2020inMECS()DOI:10.5815/ijcnis.2020.06.05Copyright©2020MECSI.J.ComputerNetworkandInformationSecurity,2020,6,57-77AProficientMechanismforCloudSecuritySupervisioninDistributiveComputingEnvironmentKamtaNathMishraDepartmentofComputerScience&Engg.,BirlaInstituteofTechnology,Mesra,Ranchi,INDIAE-mail:mishrakn@yahoo.comReceived:09July2020;Accepted:13September2020;Published:08December2020Abstract:Intheexistingepoch,thecloud-IoTintegrateddistributivecomputingisearningveryhighattractivenessbecauseofitsimmensecharacteristicswhichcanbedividedintotwocategoriesnamelyessentialandcommoncharacteristics.Theessentialcharacteristicsofcloud-IoTcomputingaredemanddependentlikebroadnetworkaccess,self-service,resourcepooling,andspeedyelasticnature.Thecommoncharacteristicsofcloud-IoTcomputingarehomogeneity,massivescale,virtualization,resilientcomputing,lowcostsoftwareavailability,serviceorientation,geographicindependentcomputation,andadvancedsafetyavailability.Thecloud-IoTdependentinternetworkeddistributivecomputationisinternetbasedcomputationenvironmentinwhichinfrastructure,applicationsoftware,andvarioussimilar/dissimilarplatformsareaccessibleinthecloudandtheendusers(businessman,developers)havetherighttouseitastheclient.CloudisastepfromUtilityComputingandseveralindustries/companiesarefrequentlyusingcloudbasedsystemsintheirday-to-daywork.Therefore,safetyissuesandchallengesofcloudcomputingcannotbeavoidedinthecurrentera.Hence,theresearchersmustdevelophighorderauthenticationprotocolsforpreventingthesafetythreatsofcloudbaseddatacommunicationsystems..TheproposedCCMP(CounterModewithCipherBlockChainingMessageAuthenticationCodeProtocol)basedmanagementofcloud-IoTintegratedinformationisatwophaseauthenticatedencoding(AE)mechanism.Thefirstphaseiswornforexecutingprivacycomputations,andthesecondphaseisusedforcomputingvalidationandtruthfulness.Here,boththecyclesusesameencodingtechnique.ItiswellknowntousthattheCCM/CCMPisanamalgamationoftwoformsnamelyAEScounterformandCBC-MAC(cipher-block-chainmessageauthenticationcode)protocolform.ThecounterformisworntocarryoutencodingwhichguaranteesdataprivacywhereasCBC-MACisworntoattaindatalegitimacyandreliability.InthisinvestigationworktheauthorhasinvestigatedandcriticallyanalyzedtheCCMPdependentsafeCloud-IoTintegrateddistributivemechanismfordata/informationmanagement.Theproposedapproachfurtherimprovestheoverallsecurityandperformanceofcloud-IoTintegratedcomputingnetworks.Further,theauthorhassolvedthechallengesofcloud-IoTcomputingbystudyingandanalyzingmajorcloud-IoTcomputingsafetyconcerns,andsafetythreatswhichareexpectedinfuturegenerationcloudcomputingsystems.Inthispaper,theauthorhasproposedCCMP&CBC-HMAC(Cipher-Block-ChainkeyHash-Message-Authentication-Code)encodingprotocolcanbeefficientlyusedforprovidinginformationsafetyandpreventingvariousattackswhenthedataisbeingtransferredbetweentheCloudandalocalnetwork.Thepreventionmechanismforunauthorizedaccessofdatawithinthecloudisalsopresentedwhoseperformanceishighlysatisfactory.Asecureandflexibleframeworktosupportself-organizeandselfregisterofconsumer’sinformationintothecloudnetworkisdesignedandtested.ThetestingresultsofproposedanalysisprovidesusveryclearevidencesthatthePRFofCCMPisasuperiorandsecureincontrasttothatofCBC-HMAC.IndexTerms:AuthenticatedEncoding,CipherBlockMessageAuthentication,CloudManagement,SecureCloudNetworks.1.IntroductionThecloud-IoTbasedcomputingisbeingfrequentlyusedinplentifulareaslikebusinessmanagement,customerrelationshipsupervision,communicationsandpartnership,officeefficiencysuits,accountingapplications,onlinestoragemanagement,electronicmailsandsharedcalendars,humanresourceandemploymentetc.Therearemanybenefitsofcloudcomputinglikescalability,24/7support,highordercomputing,payasmuchasyouuse,virtualrealityanddynamiccommunicationsystems.Atthesametimecloudcomputinghascertainnegativeaspectslikesafety,lock-in,deficiencyofpowerandtrustworthiness.Thesafetyisamajordistressincloudcomputing.So,inthisresearchworktheauthorisfocusingonvariousprotectionconcepts,issues,concerns,andsafetythreats[1,2].58AProficientMechanismforCloudSecuritySupervisioninDistributiveComputingEnvironmentCopyright©2020MECSI.J.ComputerNetworkandInformationSecurity,2020,6,57-77TheNISTdefinedtheCloudComputingarchitecturebyunfoldingfiveimportantcharacteristics,threebuildingblocksandfourclouddeploymentrepresentations[3].Further,NSITdefinedthreeservicerepresentationsofcloudcomputingwhichareknownasSoftwareasaService(SaaS),PlatformasaService(PaaS)andInfrastructureasaService(IaaS).TheSaaSprovidesthesoftwareandapplicationsproductstotheusersondemandthroughouttheinternet.ThePaaSprovidesthecompatibleplatformtotheusersaspertheirdemandsacrosstheglobalnetworkfordevelopingsoftwareproductsusingavailablelibrariesandtools.TheIaaSprovidesinfrastructuretotheusersaspertheirdemandsacrosstheinternet.Thecloudrepresentationisdividedintofourtype’snamelyPrivatecloud,Communitycloud,PubliccloudandHybridcloud.Inthecaseo

1 / 21
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功