Open Access Open Access  Restricted Access Subscription Access

User Identity based Authentication as a Service (UIDAaaS) for Public Cloud Environment


Affiliations
1 Department of Computer Science, St. Joseph’s College (Autonomous), Tiruchirappalli – 620002, Tamil Nadu, India
 

Objectives: In today's Technological World, Information Security is an essential aspect for the internet applications. Cloud computing is an increasing current class of services for any type of users of the internet. Authentication is a major security problem in the cloud system and internet. This paper proposes an Authentication Password Generation (APG) algorithm, Authentication Key Generation (AKG) and Authentication Verification Algorithm (Auth_V) for security in the cloud system. Methods/Statistical Analysis: Authentication is more important among other security parameters such as integrity, confidentiality and privacy. Authentication mechanism includes different cryptography techniques that can be used for securing the data in cloud systems. These proposed three algorithms are used in the authentication process of cloud environment. It executes the ASCII code of each value in the original data. Findings: Proposed APG, AKG and Auth_V authentication algorithms are implemented in .NET and deployed on the windows azures platform of cloud environment. These proposed authentication algorithms easily fit into any type of service in the cloud system. APG is used to create a password which generates the alphabets along the special characters. Application/Improvements: Security is more important in the cloud computing. The proposed APG, AKG and Auth_V algorithms have provided better authentication mechanism to the cloud user. These techniques are suitable for education, healthcare and agriculture based applications to securely access the data in a cloud computing environment.

Keywords

Authentication, Authentication Key Generation, Authentication Password Generation, Authentication Verification, Cloud Security, Cryptography.
User

Abstract Views: 146

PDF Views: 0




  • User Identity based Authentication as a Service (UIDAaaS) for Public Cloud Environment

Abstract Views: 146  |  PDF Views: 0

Authors

N. Veeraragavan
Department of Computer Science, St. Joseph’s College (Autonomous), Tiruchirappalli – 620002, Tamil Nadu, India
L. Arockiam
Department of Computer Science, St. Joseph’s College (Autonomous), Tiruchirappalli – 620002, Tamil Nadu, India

Abstract


Objectives: In today's Technological World, Information Security is an essential aspect for the internet applications. Cloud computing is an increasing current class of services for any type of users of the internet. Authentication is a major security problem in the cloud system and internet. This paper proposes an Authentication Password Generation (APG) algorithm, Authentication Key Generation (AKG) and Authentication Verification Algorithm (Auth_V) for security in the cloud system. Methods/Statistical Analysis: Authentication is more important among other security parameters such as integrity, confidentiality and privacy. Authentication mechanism includes different cryptography techniques that can be used for securing the data in cloud systems. These proposed three algorithms are used in the authentication process of cloud environment. It executes the ASCII code of each value in the original data. Findings: Proposed APG, AKG and Auth_V authentication algorithms are implemented in .NET and deployed on the windows azures platform of cloud environment. These proposed authentication algorithms easily fit into any type of service in the cloud system. APG is used to create a password which generates the alphabets along the special characters. Application/Improvements: Security is more important in the cloud computing. The proposed APG, AKG and Auth_V algorithms have provided better authentication mechanism to the cloud user. These techniques are suitable for education, healthcare and agriculture based applications to securely access the data in a cloud computing environment.

Keywords


Authentication, Authentication Key Generation, Authentication Password Generation, Authentication Verification, Cloud Security, Cryptography.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i32%2F129030