I.J.ComputerNetworkandInformationSecurity,2020,6,57-77PublishedOnlineDecember2020inMECS()DOI:10.5815/ijcnis.2020.06.05Copyright©2020MECSI.J.ComputerNetworkandInformationSecurity,2020,6,57-77AProficientMechanismforCloudSecuritySupervisioninDistributiveComputingEnvironmentKamtaNathMishraDepartmentofComputerScience&Engg.,BirlaInstituteofTechnology,Mesra,Ranchi,INDIAE-mail:mishrakn@yahoo.comReceived:09July2020;Accepted:13September2020;Published:08December2020Abstract:Intheexistingepoch,thecloud-IoTintegrateddistributivecomputingisearningveryhighattractivenessbecauseofitsimmensecharacteristicswhichcanbedividedintotwocategoriesnamelyessentialandcommoncharacteristics.Theessentialcharacteristicsofcloud-IoTcomputingaredemanddependentlikebroadnetworkaccess,self-service,resourcepooling,andspeedyelasticnature.Thecommoncharacteristicsofcloud-IoTcomputingarehomogeneity,massivescale,virtualization,resilientcomputing,lowcostsoftwareavailability,serviceorientation,geographicindependentcomputation,andadvancedsafetyavailability.Thecloud-IoTdependentinternetworkeddistributivecomputationisinternetbasedcomputationenvironmentinwhichinfrastructure,applicationsoftware,andvarioussimilar/dissimilarplatformsareaccessibleinthecloudandtheendusers(businessman,developers)havetherighttouseitastheclient.CloudisastepfromUtilityComputingandseveralindustries/companiesarefrequentlyusingcloudbasedsystemsintheirday-to-daywork.Therefore,safetyissuesandchallengesofcloudcomputingcannotbeavoidedinthecurrentera.Hence,theresearchersmustdevelophighorderauthenticationprotocolsforpreventingthesafetythreatsofcloudbaseddatacommunicationsystems..TheproposedCCMP(CounterModewithCipherBlockChainingMessageAuthenticationCodeProtocol)basedmanagementofcloud-IoTintegratedinformationisatwophaseauthenticatedencoding(AE)mechanism.Thefirstphaseiswornforexecutingprivacycomputations,andthesecondphaseisusedforcomputingvalidationandtruthfulness.Here,boththecyclesusesameencodingtechnique.ItiswellknowntousthattheCCM/CCMPisanamalgamationoftwoformsnamelyAEScounterformandCBC-MAC(cipher-block-chainmessageauthenticationcode)protocolform.ThecounterformisworntocarryoutencodingwhichguaranteesdataprivacywhereasCBC-MACisworntoattaindatalegitimacyandreliability.InthisinvestigationworktheauthorhasinvestigatedandcriticallyanalyzedtheCCMPdependentsafeCloud-IoTintegrateddistributivemechanismfordata/informationmanagement.Theproposedapproachfurtherimprovestheoverallsecurityandperformanceofcloud-IoTintegratedcomputingnetworks.Further,theauthorhassolvedthechallengesofcloud-IoTcomputingbystudyingandanalyzingmajorcloud-IoTcomputingsafetyconcerns,andsafetythreatswhichareexpectedinfuturegenerationcloudcomputingsystems.Inthispaper,theauthorhasproposedCCMP&CBC-HMAC(Cipher-Block-ChainkeyHash-Message-Authentication-Code)encodingprotocolcanbeefficientlyusedforprovidinginformationsafetyandpreventingvariousattackswhenthedataisbeingtransferredbetweentheCloudandalocalnetwork.Thepreventionmechanismforunauthorizedaccessofdatawithinthecloudisalsopresentedwhoseperformanceishighlysatisfactory.Asecureandflexibleframeworktosupportself-organizeandselfregisterofconsumer’sinformationintothecloudnetworkisdesignedandtested.ThetestingresultsofproposedanalysisprovidesusveryclearevidencesthatthePRFofCCMPisasuperiorandsecureincontrasttothatofCBC-HMAC.IndexTerms:AuthenticatedEncoding,CipherBlockMessageAuthentication,CloudManagement,SecureCloudNetworks.1.IntroductionThecloud-IoTbasedcomputingisbeingfrequentlyusedinplentifulareaslikebusinessmanagement,customerrelationshipsupervision,communicationsandpartnership,officeefficiencysuits,accountingapplications,onlinestoragemanagement,electronicmailsandsharedcalendars,humanresourceandemploymentetc.Therearemanybenefitsofcloudcomputinglikescalability,24/7support,highordercomputing,payasmuchasyouuse,virtualrealityanddynamiccommunicationsystems.Atthesametimecloudcomputinghascertainnegativeaspectslikesafety,lock-in,deficiencyofpowerandtrustworthiness.Thesafetyisamajordistressincloudcomputing.So,inthisresearchworktheauthorisfocusingonvariousprotectionconcepts,issues,concerns,andsafetythreats[1,2].58AProficientMechanismforCloudSecuritySupervisioninDistributiveComputingEnvironmentCopyright©2020MECSI.J.ComputerNetworkandInformationSecurity,2020,6,57-77TheNISTdefinedtheCloudComputingarchitecturebyunfoldingfiveimportantcharacteristics,threebuildingblocksandfourclouddeploymentrepresentations[3].Further,NSITdefinedthreeservicerepresentationsofcloudcomputingwhichareknownasSoftwareasaService(SaaS),PlatformasaService(PaaS)andInfrastructureasaService(IaaS).TheSaaSprovidesthesoftwareandapplicationsproductstotheusersondemandthroughouttheinternet.ThePaaSprovidesthecompatibleplatformtotheusersaspertheirdemandsacrosstheglobalnetworkfordevelopingsoftwareproductsusingavailablelibrariesandtools.TheIaaSprovidesinfrastructuretotheusersaspertheirdemandsacrosstheinternet.Thecloudrepresentationisdividedintofourtype’snamelyPrivatecloud,Communitycloud,PubliccloudandHybridcloud.Inthecaseo