An approach of dredging the interconnected nodes and repudiating attacks in cloud network

Raziqa Masood, Nitin Pandey, Q. P. Rana
{"title":"An approach of dredging the interconnected nodes and repudiating attacks in cloud network","authors":"Raziqa Masood, Nitin Pandey, Q. P. Rana","doi":"10.1109/UPCON.2017.8251021","DOIUrl":null,"url":null,"abstract":"In cloud computing environment, there are malignant nodes which create a huge problem to transfer data in communication. As there are so many models to prevent the data over the network, here we try to prevent or make secure to the network by avoiding mallicious nodes in between the communication. So the probabiliostic approach what we use here is a coherent tool to supervise the security challenges in the cloud environment. The matter of security for cloud computing is a superficial quality of service from cloud service providers. Even, cloud computing dealing everyday with new challenges, which is in process to well investigate. This research work draws the light on aspect regarding with the cloud data transmission and security by identifying the malignanat nodes in between the communication. Cloud computing network shared the common pool of resources like hardware, framework, platforms and security mechanisms. therefore Cloud Computing cache the information and deliver the secure transaction of data, so privacy and security has become the bone of contention which hampers the process to execute safely. To ensure the security of data in cloud environment, we proposed a method by implementing white box cryptography on RSA algorithm and then we work on the network, and find the malignant nodes which hampering the communication by hitting each other in the network. Several existing security models already have been deployed with security attacks. A probabilistic authentication and authorization approach is introduced to overcome this attack easily. It observes corrupted nodes before hitting with maximum probability. here we use a command table to conquer the malignant nodes. then we do the comparative study and it shows the probabilistic authentication and authorization protocol gives the performance much better than the old ones.","PeriodicalId":422673,"journal":{"name":"2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UPCON.2017.8251021","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In cloud computing environment, there are malignant nodes which create a huge problem to transfer data in communication. As there are so many models to prevent the data over the network, here we try to prevent or make secure to the network by avoiding mallicious nodes in between the communication. So the probabiliostic approach what we use here is a coherent tool to supervise the security challenges in the cloud environment. The matter of security for cloud computing is a superficial quality of service from cloud service providers. Even, cloud computing dealing everyday with new challenges, which is in process to well investigate. This research work draws the light on aspect regarding with the cloud data transmission and security by identifying the malignanat nodes in between the communication. Cloud computing network shared the common pool of resources like hardware, framework, platforms and security mechanisms. therefore Cloud Computing cache the information and deliver the secure transaction of data, so privacy and security has become the bone of contention which hampers the process to execute safely. To ensure the security of data in cloud environment, we proposed a method by implementing white box cryptography on RSA algorithm and then we work on the network, and find the malignant nodes which hampering the communication by hitting each other in the network. Several existing security models already have been deployed with security attacks. A probabilistic authentication and authorization approach is introduced to overcome this attack easily. It observes corrupted nodes before hitting with maximum probability. here we use a command table to conquer the malignant nodes. then we do the comparative study and it shows the probabilistic authentication and authorization protocol gives the performance much better than the old ones.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种云网络中互联节点疏通与拒绝攻击的方法
在云计算环境中,存在恶性节点,给通信中的数据传输带来了巨大的问题。由于有很多模型来防止网络上的数据,这里我们试图通过避免恶意节点之间的通信来防止或保证网络的安全。因此,我们在这里使用的概率方法是一种连贯的工具,用于监督云环境中的安全挑战。云计算的安全问题是云服务提供商提供的服务质量的表面问题。甚至,云计算每天都在处理新的挑战,这是在很好的调查过程中。本研究工作通过识别通信中的恶性节点,对云数据的传输和安全进行了探讨。云计算网络共享硬件、框架、平台、安全机制等公共资源池。因此,云计算缓存信息并提供安全的数据交易,因此隐私和安全性成为阻碍进程安全执行的争论焦点。为了保证云环境下数据的安全,我们提出了一种在RSA算法上实现白盒加密的方法,然后在网络上进行工作,发现网络中相互撞击阻碍通信的恶性节点。一些现有的安全模型已经部署了安全攻击。为了轻松克服这种攻击,引入了一种概率身份验证和授权方法。它在以最大概率命中前观察损坏的节点。这里我们使用命令表来征服恶性节点。在此基础上进行了对比研究,结果表明概率认证授权协议的性能明显优于传统的概率认证授权协议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A technical review on smart grids in India A Z-source DC-DC dual output converter A 0.45V, 1.3 nW bandgap CMOS voltage reference with temperature compensation Model order reduction via time moment modeling and clustering technique Tuning of modified PID load frequency controller for interconnected system with wind power plant via IMC tuning method
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1