Open Access
Subscription Access
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud. Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%, and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to securing from attackers.
Keywords
Authentication, Attacks, Cloud, Cryptography, Protocols, Router, Security.
User
Font Size
Information
- X. Wang and S. Zhang, Research about optimization of campus network security system, Procedia Eng., vol. 15, pp. 1802–1806, 2011.
- B.Harikrishna, S.Kiran, G.Murali and R.Pradeep Kumar Reddy, Security Issues In Service Model Of Cloud Computing Environment, Procedia Computer Science 87 ( 2016 ) 246 251, Science Direct.
- Cataldo Basile, Antonio Lioy, Analysis of Application Layer Filtering Policies With Application to HTTP, IEEE/ ACM Transactions on Networking, 1063-6692, 2013 IEEE.
- Free CCNA Tutorials. Study CCNA For Free!. Studyccna. com. N.p., 2017. Web. 21 Mar. 2017.
- Cite A Website - Cite This For Me. Networkstraining.com. N.p., 2017. Web. 21 Mar. 2017.
- B.Harikrishna, N.Anusha, K.Manideep, Madhusudhanarao, Ch, Quarantine Stabilizing MultiKeyword Rated Discover with Unfamiliar ID Transferover Encrypted Cloud Warning IJERCSE Vol 2, Issue 2, February 2015.
- Zili Shao, Chun Xue, Qingfeng Zhuge, Meikang Qiu, Bin Xiao, Edwin H.-M Sha, ―Security Protection and Checking for Embedded System Integration against Buffer Overflow attacks via Hardware/Software‖, IEEE Transactions on Computers, Vol. 55, NO. 4, April 2006.
- Source: https://docs.gns3.com/. B. Harikrishna, Efficient Resource Allocation using Fair Scheduling in Cloud Based Systems, RITS ICA EM 2012.
- Chandra Wijaya 2011 IEEE 355-360.
- B. Harikrishna, S. Kiran, R. Pradeep Kumar Reddy, Protection on sensitive information in cloud Cryptography algorithms, IEEE digital Library 10.1109/CESYS.2016.7889894.
- Source: Computer weekly.com
- Jason C. Neumann The book of GNS3 Device Nodes, Live Switches, and the Internet 2015.
- Khalid Abu Al-Saud, Hatim Tahir, Moutaz Saleh and Mohammed Saleh 2010 IAJIT 380- 387.
- Check point FireWall-1, version 3.0 White paper June 1997 http://www.checkpoint.com/products/whitepapers/wp 30.pdf.
- Wallace, Kevin. CCNP Routing And Switching ROUTE 300-101 Official Cert Guide. 1st ed. Indianapolis, IN: Pearson Education, 2015.
- Hon Sun Chiu, Kwan L. Yeung, and King-Shan Lui- J-CAR: An Efficient Joint Channel Assignment and Routing Protocol for IEEE 802.11-Based MultiChannel Multi-Interface Mobile Ad Hoc Networks, 1706 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8 (4) , APRIL 2009.
- Anja Feldmann, Jennifer Rexford, and Ramon Caceres, ”Efficient Policies for Carrying Web Traffic Over Flow- Switched Networks” , IEEE/ ACM transactions on networking, vol. 6, no. 6, December 1998.
- Q.Zhao, Y. Mou, and S.H.. Qin, “The design of Security authentication system based on campus Network, “ Proc. – Int. Conf. Electr. Control Eng. ICECE 2010, pp. 3070-3073, 2010.
Abstract Views: 235
PDF Views: 0