The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objectives/Background: Cloud infrastructure is a pool of commuting resources such as information storage servers, application progress platforms, load balancers and virtual machines that are shared between the users for transactional processes with on demand process. However, transactional process lacks a secure authentication system, while it does not attest the trustworthiness of dynamic contents threats which outlaw the cloud system. Methods/Statistical Analysis: To establish the authenticity and avoiding improper data modification on cloud based data transactions, a framework called, multi aspect Sparse Time Integrated Cut-off Authentication (STI-CA) for Cloud Data Storage is designed. STI-CA framework commences with the password registry for each cloud user on the basis of two dimensional service matrices reducing the overhead incurred during user authentication by applying Sparse Vector Cloud User Registry. Next, by utilizing Time Integrated One Time Password, which is unique for each cloud user and each login reduces the execution time and space complexity as the cloud server does not maintain the password. Finally, the Cut-off Potential Cryptography prevents the unauthorized user modification on transactional data, therefore improving the security. Here the Amazon Simple Storage Service (Amazon S3) dataset is used for experiment using the JAVA coding with Cloudsim3. A series of simulation results are performed to test the data confidentiality, execution time, communication overhead and space complexity for obtaining transactional data and measure the effectiveness of STI-CA framework. Findings: STI-CA framework offers better performance with an improvement of the data confidentiality by 31%, reduces execution time by 20%, reduce communication overhead by 30% and also minimize space complexity by 22% compared to existing models of DRAFT and iCloud native Mac OS X respectively. Applications/Improvements: It can be further extended with implementation of new model with different parameters which improves more confidentiality and integrity.

Keywords

Authentication, Cloud Data Storage, Cut-off, Multi Aspect, Password registry, Potential Cryptography, Sparse, Time Integrated.
User