Conference PaperPDF Available

Enhancing Public Cloud Security by Developing a Model For User Authentication and Data Integrity Checking

Authors:

Abstract and Figures

Cloud computing is being adopted generally and it has shown a high impact on the development of businesses, it enables on-demand access to shared pool of configurable computing resources. With many benefits of cloud computing it is faced by many threats just like any other computer system, among the threats is security. Authentication plays a large role in maintaining the security of data which involves confidentiality, availability and integrity of data. Cloud users need to be assured that their outsourced files to the public cloud maintains its integrity. Several authentication attacks has surfaced in cloud computing and there is need to develop a scheme that are strong enough to prevent this attacks. In this paper we presented an enhanced a model for public cloud user authentication and files integrity checking. We presented a model that uses the two-factor authentication using the username and password and a certificate based authentication for user authentication. The hash value of files are gotten and encrypted before outsourcing to the cloud so as to detect integrity failure. Our proposed model increases user confidence in cloud application as we use symmetric and asymmetric encryption for uploading of files to ensure a secure connection between cloud users and cloud providers, The model also reduces the computation power on user devices. CCS CONCEPTS •Security •Integrity •Authentication.
Content may be subject to copyright.






 
!"#$

$%%&'"


 
%$&#$$
 !
(
)
  *     
+  $, +
&
       
$     
     ) 
+  $(
   +
     $ 
&
 
    &$    )
    
  +  &$ ,
     )*
)
+$
+
$
-+
  )    
    +   
 )     
)
$
"# 
. ..$
$%&"!
( / //
/ (+/ 0/ 
&$
$# !" "#
)1
23
)
+
&$4
5(
6$

7

)

)

889/)

"99!:;$<
"99$(
=
*)&
+>$$)&
?
)
@
$
&
)+$
<A(-)
B(( 
> (( CB? 
D"9"9()E>?$
AEE$E9$F!E"GF!HBI89
B(( 
> (( CB? 
$$
 ) + "   
+
  $  + 
  -* *J
)&  
% $   
 )>  ? 
>K ?     > ?) 
     
$:;:";$
<"A((L
5M&
     
    )  
M  >$$A N)&(KC
% ?$)
      
    
M$  
      
):G";$
    M
$4$
(    
   
)
$ C    ) **
      
  )   $ 
       )
2 )3  $'()  
         
   $
   
 $    ) )  
@=
 $ (  )  
     $
$
      $ 
      
1 &
'*+)$  "9I ( 
  ) 
+ )  OO  O$ 
"99H 4      
)  ',)$  
  & M'-) &
)
7=
     $ 
   ./ & 
+   )  
))@
    '*+)0 ( 
  +  
      
    (  
  )   
    
  
EM'1)0
2A*(+P
   P  )P
&  M $ A *
P
      
(  K$ A*
    M  ) 
     ) =$
     
)  )    
  ) & 
)6P&'1)$
   +
     
$
"$3 ! !!4&
(      @
   $  
  & 
  )&  )
(    ) 
*A*
56   ./A
  ) 
$
B(( 
> (( CB? 
$$
57   ./A K 
      & 
$
5./A )&

(   @  )  
@A
 A     )
   )  

1$
8
  )& )   
       
=$ N       
/ P &  )    
$
9 A        
)      
  $     
=$
77A)&& 
      M ) 
'*):'+):'()0
(=


1 = '*-)
A
? 7  6 8 
       ( K 
 ) =  
$)
$
      )  
&$
? 58 &
     
   =  
$%<P
)=$$
=$

?   "A     
  )   
 )  
    $  
     
))&
&$
?  $ 5A  K
    
+ * 
)M$
? 7A
     )  
     
C   
     
 =$ J
  +  ) A
  $ Behavioral
biometric:  
$    
 &&    
$
?  biometric:
$
  
+*$
  +  J% 
&&3)
&   P 
)     & 
3$
)
$   A
2     
+P+
    
  +  *
3$  1A
O)
   O$  ((    
@
    & 
 & )  
 &  %((  ) 
A
$ J<&A&
   )  
&)$&
   &  
) ) )
1:H;$
B(( 
> (( CB? 
$$
"$ ' &A &  
1
 &     
$
G$ %***&A,&
  )   + 
 $  &  
       
++:H;:B;:";$
F$  &A , &  
     

+$
!$ 5+  &A ,  &
+
 &       
+
H$  & &A ,  &
&  )
&&:H;$
B$  &A    &  
    &$ & & 
  & 
&     ) ) 
))$
I$  +A  +   
  23  )  &  
C    E )$  
 & &  /)
  ) $$ )&&

8$ K &A  ) &  )
&&)
)EK($
9$  LA  &    )
 )     
&   
:B;:";$
G$!3 &"!$
$:B; KKK
KK  &     
+) &$
*+ 
 > Q  &?   
&       
  +   $ K &
 )  +      
+ 
$
        
  +$   =  
    +
      


 6   :B;   
P)
 $   
%:"";   
 )  )  
 )      

)*    ) 
  $    
+   
       
)* (K*J' 
  +    
  7 
 * (K*J' $ 
 :I;
+
     0 
> 0"!H?+
$
F$!!9!"3
        
=      
 &    
    
+ 
       
&+)
  )&   )&
   M  
   
$ 
 
   + )   @ 
)&    )
  & & 
&  ** &$ < G
)1$
B(( 
> (( CB? 
$$
<GA
!$!!9"; 4
      
      
&+$
$  '         )
 0G$
"$'  
$
G$)
= )
$
:;
10!"""3
)
+<
)*=)
)>(+
?

 )
&)+
)* *

$<&+
 0G+
))E
<
+)
+)
'  
)&*
&*1
+$<H
$
<FA4
10*0! "#" 9
!"""3
+)A
*0*A(A
))
.*/>
)?$
.+/
$
.(/>'*
?)&' 
>' 

?$
.-/&)
 
&>'*?
&>'* &?
$> 2*
*3
)&
&
&&?$
B(( 
> (( CB? 
$$
.,/(
&
&)&$
.1/)&
5++$
+0+8A<

.*/)

.+/
>)?$
.(/
>*?&> ?
>*?>
)?
+$
.-/(
>*?1
>)?$
.,/+)
&+
))>*?
&$
.1/
>)?
)$

$
(0(8+A+
)
*8+>+*?)

.*/
+ 0G
> 0G
)N 
*"*"9!?$
.+/0
&>
+?
&>?
)*
+$
.(/
>+*R+
?' 
>' 
>??
)&
>'*?$
.-/
&>'* R&? 
)&
%>'*?
&>'* R&?
$&
&>
?
)*+$
+8
+1
>'*?&>'* R&?
.*/(&>'*
R&?&
>'*?' )
&$
1>+*+
?
.+/+
+>+*
?)P
>S))
&?$
.(/
+*)>'*
R&?>
&?'+
'* R&)>
R< M+
Q?$
.-/
+

+
+

+$
-0-8)+A
)+)
*8=+)
))$
B(( 
> (( CB? 
$$
.*/&)
)' $
.+/>
'&>'* R?+*>'*
+R?< M++R?$
.(/' 
)
&&>'*?
&>'* &? 
)&$
.-/
>'*?&>'* &?
$
+81
>'*?&>'*
&?$
.*/&>'*
&? )&
>'*?)
&' $
.+/1>
'&>'* R?
+*>'*+R?< M+
+R?$
.(/'
&>'* R?)&
+*>'*+R?)
&)
+$
,0,8(&<A
+A
>?0)+1
+>+*?
)'* R&
))
>?
)+$<!
)$
<!A
10+4# <" 9!""
"3
-      
&    
&)
      + 
$     =
)$
&&
    +$   

 & )   
&$
=<#

$
=0*
        
+ +    
$<H)$
B(( 
> (( CB? 
$$
<HA
=0+5

    ) 
)+&$
*05 8=
   )    
  +$  )  < B 
$
=8
+0 3  8      
E  )$  
& ) )+  
 +  $ 
)<I$
<IALK
(0 97  8  E*
    ) + $
      
  +    &
$)<8$
<8A0
>0? 3#  "#
 
=   
 K0K N$T  (  T 
0%L( )$<)
 
% UL )& )  J 
B(( 
> (( CB? 
$$
$ <  )  )   V%KK
$  +  + 
    +   
$, 4K4    
+>   &?)) 
     +
4K4    
 ) )  &  
   (+ 
$ 
  -K )    
    )  
     
 $ -  K0K 
$
@? !3
<    )  
= 0K ) 
     ) 
  L )    
 
 + $ , 
    & )    
 +    +  
     +  
$
   )      ' 
 )     
$) 
    )  
1       
+$
*A0"#3"#B!"# "#
 )      
  )&   
&)
 )     
)   +   
  ,   
' 
)+$L
)    0  
     +   
      
  )    
&      +  $
<    
    &  
  & )  
)+$
!!#
:;K$ %  $ 4 2 N  +  
   N  
3 KI99*F!$"9
:";  W  ,  2 
K     ( (A 
 (  2 >T( ?  T 
 (    5$ B N$ F
"9H$
:G;AEE)$M$E)***E $
IE9IE"98FA99$
:F;AEE)$M$EE $  
IE9IE"98FA9F$
:!;%  2 4  A  '
3  
AEE$E"99HE"E"IE****
**E$
:H; %%4KK&
2(      ( (
'3  T  (  
%  N (  2 
      3 4
  '   >4'? J $
G8*FF$  NA "G"*IGHG$<A!$!!  
 AEE$EEN( -EN( -9H$$ "G*"F
%"9I$
:B;4   T 0    J
L M(XK 
) 2K  K   
3F (% (  (  (
>(( "99B?$
:I; L3% 5
  <   (3 %    
S4M"9B$
:8;N &     2 
=  ( (A  3 
B(( 
> (( CB? 
$$
T     (   )
' NA""BB*"IV>5*B*I?"9B$
:9;$   $   3  
((=(&3
T')))$$5A*BN*H
"98
:;&  2   K  (
(3%,%"9B$
:";2( ( 2   AEE)))$$E
M*** !*98*"9898A99$
:G;% %  2       3
0'%'(NN5' YN(- (0--L -<  ('N('
N'N4N''N4"9G$
:F;N 24
  3
$I99*I <"99H
:-;$AAEE$$EEI99*I*
EI99*I*+$E:"9G;$
:!;  ( &  
J$ T (
('> -G"8BA"99B(+-M?
5$"9-"9F
:H;$J&  J$Y2 (- & 
 5%3K$''' $(
( )N)&$$"H9*"HF"99
:B;N$ ( $ 12'   (
3K$'''($*H"9
:I;,$L 2  ( (  K 
3 K$'''" $(  ( '
(N)&$"H*"8"9"
:8;V$Y U$ ,2)( 
>"99?3  K$ ''' $ (  (
 )'$*F"99
:"9;0 <= 2 )  ( (  
=3T
( 5IN$"%"9B
:"; $ 5   T$ 5 K$ ' 3
((AK 3 %(4)  N)
& JNA8BI*9*9B*H"H8!*I$%0A9*9B*H"H8!*H"99$
:"";% %  2       3
0'%'(NN5' YN(- (0--L -<  ('N('
N'N4N''N4"9G$
... Pada proses berbagi sumberdaya, keamanan dan kerahasian data menjadi isu utama, sehingga apabila terjadi serangan cyber akan menyebabkan kerugian [3]. Hal penting yang perlu diperhatikan adalah Confidentiality, Integrity and Availability (CIA) yang merupakan standar untuk mengevaluasi dan menerapkan keamanan informasi [4]. ...
Article
Full-text available
Computer network systems have been designing to share resources. Sharing resources process, data security, and confidentiality are main issues in anticipating misuse of the access to information by unauthorized parties. The solution to anticipating these problems is the availability of a security system capable of handling various intruders who threaten the system and protect network resources. This study builds and analyzes the performance of computer network security using cowrie honeypot and snort inline-mode as an Intrusion Prevention System (IPS). The development process goes through the stages of analysis, design, implementation, and monitoring. The content analysis method has been using to explore the problems and requirements of the system built. The security system was build by configuring the IP address and network system devices (server, remote admin, client attacker). The test has been carrying out on 3 test parameters (confidentiality, availability, and integrity), comparison testing method has been using to test the integrity parameters. The test results indicate that the system functionality test for user needs have fulfilled, the results of the confidentiality test (83.3%), availability (93.3%), and the integrity of the inline-mode snort show faster response time (0.069 seconds on average) and more CPU resource usage efficient (0.04% average) than the cowrie honeypot. IPS snort inline-mode overall integrity parameter testing is more recommended for used network security systems than cowrie honeypots.
Article
Full-text available
Cloud computing has been envisioned as the definite and concerning solution to the rising storage costs of IT Enterprises. There are many cloud computing initiatives from IT giants such as Google, Amazon, Microsoft, IBM. Integrity monitoring is essential in cloud storage for the same reasons that data integrity is critical for any data centre. Data integrity is defined as the accuracy and consistency of stored data, in absence of any alteration to the data between two updates of a file or record. In order to ensure the integrity and availability of data in Cloud and enforce the quality of cloud storage service, efficient methods that enable on-demand data correctness verification on behalf of cloud users have to be designed. To overcome data integrity problem, many techniques are proposed under different systems and security models. This paper will focus on some of the integrity proving techniques in detail along with their advantages and disadvantages.
Article
Many of cloud service providers pretend that user’s data is saved securely with no data integrity violation. But as we know, anything saved in the internet environment can’t be perfectly safe which reduce users trust that their files in safe situation, then they can’t store sensitive data in the cloud. In this work, we work on the problem of integrity of shared data over the cloud and a new model was built with dynamic data operation support. This model contains an intermediate system to detect file integrity violation by hashing the file, using SHA-256 algorithm, before saving it on the cloud and after retrieving it, then compare the two hash values.Several experiments were conducted to ensure the ability of detecting data integrity violation, different sizes of .doc files starting from 13KB, ending with 5MB were collected. On the other hand, different types of tests were conducted to evaluate the accuracy and concurrent access. The evaluation process proves that our intermediate system is able to guarantee Files accuracy and detect many types of file modifications. Also, it is able to organize concurrent access operations on shared file and enable just one user to modify File at the same point.Keywords-cloud computing, integrity detection, shared file, dynamic data operations, accuracy, concurrent access
Conference Paper
Cloud brings in a set of unparalleled benefits as well as a host of security threats. Strong security is the key to reap the benefits of cloud computing. While it is a known fact that cloud adoption saves energy consumption as it leverages technologies like virtualization, there are times when cloud also increases instances of energy consumption due to extra security controls required. This paper highlights some of the key security challenges and controls in cloud and compares energy consumption prospect of these controls with traditional data center scenarios. In this paper, we try to formulate extra energy requirements for the desired level of security controls in cloud environment. Different cloud deployment model were considered while doing this analysis. In the concluding section, we also discuss the possible recommendations that can bring down the energy consumption while maintaining the required security level for cloud data and applications.
Conference Paper
Innovation is necessary to ride the inevitable tide of change. The buzzword of 2009 seems to be "cloud computing" which is a futuristic platform to provides dynamic resource pools, virtualization, and high availability and enables the sharing, selection and aggregation of geographically distributed heterogeneous resources for solving large-scale problems in science and engineering. But with this ever developing cloud concept, problems are arising from this ¿golden solution¿ in the enterprise arena. Preventing intruders from attacking the cloud infrastructure is the only realistic thing the staff, management and planners can foresee. Regardless of company size or volume and magnitude of the cloud, this paper explains how maneuver IT virtualization strategy could be used in responding to a denial of service attack. After picking up a grossly abnormal spike in inbound traffic, targeted applications could be immediately transferred to virtual machines hosted in another data center. We're not reinventing the wheel. We have lots of technology and standardized solutions we can already use to engineer into the stack. We are just introducing them in the way least expected.
Conference Paper
We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs. The client maintains a constant amount of metadata to verify the proof. The challenge/response protocol transmits a small, constant amount of data, which minimizes network communication. Thus, the PDP model for remote data checking supports large data sets in widely-distributed storage systems. We present two provably-secure PDP schemes that are more efficient than previous solutions, even when compared with schemes that achieve weaker guarantees. In particular, the overhead at the server is low (or even constant), as opposed to linear in the size of the data. Experiments using our implementation verify the practicality of PDP and reveal that the performance of PDP is bounded by disk I/O and not by cryptographic computation.
Gmail Disaster :Reports on Email deletions
  • Micheal Arrignton
Micheal arrignton " Gmail Disaster :Reports on Email deletions" Available at https://techcrunch.com/2006/12/28/gmail-disaster-reports-ofmass-email-deletions/.
CIA Triad for Achieving Accountability in Cloud Computing Environment
  • Suneeta Mohanty
  • Mrinmoy Ganguly
  • Prasant Kumar Pattnaik
Suneeta Mohanty,Mrinmoy Ganguly,Prasant Kumar Pattnaik, "CIA Triad for Achieving Accountability in Cloud Computing Environment" International Journal of Computer Science and Mobile Applications, National Conference on "The Things Services and Applications of Internet of Things", Gandhi Institute for Education and Technology (GIET) Baniatangi, pg. 39-44. ISSN: 2321-8363. Impact Factor: 5.515 available online at http://ijcsma.com/publications/NCSIOT/NCSIOT06.pdf. 23-24 March 2018.
A Survey on Cloud Computing Techniques for Data Integrity Checking
Dr. Rahma Teirab and Dr. Ahmed Khameis Sharaf,"A Survey on Cloud Computing Techniques for Data Integrity Checking",International Journal of Innovation Education and Research www.ijier.net Vol:-7 No-6, 2019