Open Access Open Access  Restricted Access Subscription Access

Network as a Service Model in Cloud Authentication by HMAC Algorithm


Affiliations
1 Department of Computer Science and Engineering, YSR Engineering College of Yogi Vemana University Proddatur Kadapa, Andhra Pradesh, 516360, India
2 Department of Computer Science and Engineering, Bapatla Engineering College, Bapatla, AP, 522101, India
 

Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud. Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%, and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to securing from attackers.

Keywords

Authentication, Attacks, Cloud, Cryptography, Protocols, Router, Security.
User
Notifications
Font Size

  • X. Wang and S. Zhang, Research about optimization of campus network security system, Procedia Eng., vol. 15, pp. 1802–1806, 2011.
  • B.Harikrishna, S.Kiran, G.Murali and R.Pradeep Kumar Reddy, Security Issues In Service Model Of Cloud Computing Environment, Procedia Computer Science 87 ( 2016 ) 246 251, Science Direct.
  • Cataldo Basile, Antonio Lioy, Analysis of Application Layer Filtering Policies With Application to HTTP, IEEE/ ACM Transactions on Networking, 1063-6692, 2013 IEEE.
  • Free CCNA Tutorials. Study CCNA For Free!. Studyccna. com. N.p., 2017. Web. 21 Mar. 2017.
  • Cite A Website - Cite This For Me. Networkstraining.com. N.p., 2017. Web. 21 Mar. 2017.
  • B.Harikrishna, N.Anusha, K.Manideep, Madhusudhanarao, Ch, Quarantine Stabilizing MultiKeyword Rated Discover with Unfamiliar ID Transferover Encrypted Cloud Warning IJERCSE Vol 2, Issue 2, February 2015.
  • Zili Shao, Chun Xue, Qingfeng Zhuge, Meikang Qiu, Bin Xiao, Edwin H.-M Sha, ―Security Protection and Checking for Embedded System Integration against Buffer Overflow attacks via Hardware/Software‖, IEEE Transactions on Computers, Vol. 55, NO. 4, April 2006.
  • Source: https://docs.gns3.com/. B. Harikrishna, Efficient Resource Allocation using Fair Scheduling in Cloud Based Systems, RITS ICA EM 2012.
  • Chandra Wijaya 2011 IEEE 355-360.
  • B. Harikrishna, S. Kiran, R. Pradeep Kumar Reddy, Protection on sensitive information in cloud Cryptography algorithms, IEEE digital Library 10.1109/CESYS.2016.7889894.
  • Source: Computer weekly.com
  • Jason C. Neumann The book of GNS3 Device Nodes, Live Switches, and the Internet 2015.
  • Khalid Abu Al-Saud, Hatim Tahir, Moutaz Saleh and Mohammed Saleh 2010 IAJIT 380- 387.
  • Check point FireWall-1, version 3.0 White paper June 1997 http://www.checkpoint.com/products/whitepapers/wp 30.pdf.
  • Wallace, Kevin. CCNP Routing And Switching ROUTE 300-101 Official Cert Guide. 1st ed. Indianapolis, IN: Pearson Education, 2015.
  • Hon Sun Chiu, Kwan L. Yeung, and King-Shan Lui- J-CAR: An Efficient Joint Channel Assignment and Routing Protocol for IEEE 802.11-Based MultiChannel Multi-Interface Mobile Ad Hoc Networks, 1706 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8 (4) , APRIL 2009.
  • Anja Feldmann, Jennifer Rexford, and Ramon Caceres, ”Efficient Policies for Carrying Web Traffic Over Flow- Switched Networks” , IEEE/ ACM transactions on networking, vol. 6, no. 6, December 1998.
  • Q.Zhao, Y. Mou, and S.H.. Qin, “The design of Security authentication system based on campus Network, “ Proc. – Int. Conf. Electr. Control Eng. ICECE 2010, pp. 3070-3073, 2010.

Abstract Views: 172

PDF Views: 0




  • Network as a Service Model in Cloud Authentication by HMAC Algorithm

Abstract Views: 172  |  PDF Views: 0

Authors

Bommala Harikrishna
Department of Computer Science and Engineering, YSR Engineering College of Yogi Vemana University Proddatur Kadapa, Andhra Pradesh, 516360, India
S. Kiran
Department of Computer Science and Engineering, YSR Engineering College of Yogi Vemana University Proddatur Kadapa, Andhra Pradesh, 516360, India
K. Mani Deep
Department of Computer Science and Engineering, Bapatla Engineering College, Bapatla, AP, 522101, India

Abstract


Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud. Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%, and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to securing from attackers.

Keywords


Authentication, Attacks, Cloud, Cryptography, Protocols, Router, Security.

References