Open Access Open Access  Restricted Access Subscription Access

Congestion Control and Protected Broadcast of Data Using FTP and TELNET in a Cloud Network


Affiliations
1 Career Point University, Kota, Rajasthan, India
2 JRN Vidyapeeth University, Udaipur, Rajasthan, India
 

This paper presenting all security issue related to an open network. When two parties communicate in insecure environment that time all the private information is accessed by unauthorized user or client so, if a network have a proper security on all devices or secure private information and restricted unauthorized activity or access. The main aims of this paper enhance the security in network when two parties communicate or transfer the information. We need to work with many security techniques and ways by which we can prepare a secure network model for user authentication. The security architecture of network protocol widely accepted as being a good abstraction for network device and user security functionality. Significant work has been done to develop efficient techniques for network security, but most of the work has concentrated on securing protocol over congestion control. The base of work is providing security when network is distributed and based on cloud network. FTP and TELNET is enhancing security in network for user authentication and secure the entire device when two or more nodes communicate. The design method is referred to as network security design depend on protocol. Protocol security allows us to make better secure of network and all network devices by FTP and TELNET security protocol. This technique restricts unauthorized user or unwanted activity by third party.

Keywords

Congestion Control Protected Broadcast, FTP, TELNET, Cloud Network, Securing Cloud Network.
User
Notifications
Font Size

  • . Helen Fouché Gaines, “Cryptanalysis”, 1939, Dover. ISBN 0-486-20097-3
  • . David Kahn, The Code breakers - The Story of Secret Writing (ISBN 0-684-83130-9)
  • . Abraham Sinkov, Elementary Cryptanalysis: A Mathematical Approach, Mathematical Association of America, 1966. ISBN 0-88385-622-0
  • . Preneel, Bart, "Advances in Cryptology — EUROCRYPT 2000", Springer Berlin Heidelberg, 2000, ISBN 978-3-540-67517-4
  • . T. Kohno, J. Viega, and D. Whiting. "The CWC Authenticated Encryption (Associated Data) Mode". NIST. Retrieved March 12, 2013.
  • . Failures of secret-key cryptography". Daniel J. Bernstein. Retrieved March 12, 2013.
  • . 19772:2009. ISO/IEC. Retrieved March 12, 2013.
  • . NIST. Retrieved April 17, 2013.
  • . Retrieved March 12, 2013.
  • . M. Bellare and C. Namprempre Retrieved April 13, 2013.
  • . H. Krawczyk. Retrieved April 13, 2013.
  • . Forouzan, B.A. (2000). TCP/IP: Protocol Suite. 1st ed. New Delhi, India: Tata McGraw-Hill Publishing Company Limited.
  • . Kozierok, Charles M. (2005). "The TCP/IP Guide v3.0". Tcpiguide.com.
  • . Dean, Tamara (2010). Network+ Guide to Networks. Delmar. pp. 168–171.
  • . Clark, M.P. (2003). Data Networks IP and the Internet. 1st ed. West Sussex, England: John Wiley & Sons Ltd.
  • . Postel, J., & Reynolds. J. (October 1985). . In The Internet Engineering Task Force.
  • . Active FTP vs. Passive FTP, a Definitive Explanation". Slacksite.com. (see http://webcache.googleusercontent.com/search?q=cache:http://slacksite.com/other/ftp.html if the original web page is not available).
  • . Parker, Don (September 2005). "Understanding the FTP Protocol". Windowsnetworking.com.
  • . Allman, M. & Metz, C. & Ostermann, S. (September 1998). RFC 2428. In The Internet Engineering Task Force.
  • . P. &Emtage, A. & Marine, A. (May 1994). "RFC 1635". The Internet Engineering Task Force.
  • . Gleason, Mike (2005). "The File Transfer Protocol and Your Firewall/NAT". Ncftp.com.
  • . Kurose, J.F. & Ross, K.W. (2010). Computer Networking. 5th ed. Boston, MA: Pearson Education, Inc.
  • . Matthews, J. (2005). Computer Networking: Internet Protocols in Action. 1st ed. Danvers, MA: John Wiley & Sons Inc.
  • . Berners-Lee, T. &Masinter, L. &McCahill, M. (December 1994). "RFC 1738". The Internet Engineering Task Force.
  • . Accessing FTP servers | How to | Firefox Help". Support.mozilla.com. 2012-09-05. Retrieved 2013-01-16.
  • . How to Enter FTP Site Password in Internet Explorer". Support.microsoft.com. 2011-09-23. Retrieved 2013-01-16.
  • . Securing FTP using SSH. Retrieved from http://www.nurdletech.com/ftp.html
  • . Allman, M. & Ostermann, S. (May 1999). "RFC 2577". The Internet Engineering Task Force.
  • . Deploying a Cloud". Dell.com. Retrieved 2012-03-27.
  • . Mariana Carroll, Paula Kotzé, Alta van der Merwe (2012). "Securing Virtual and Cloud
  • . Environments". In I. Ivanov et al. Cloud Computing and Services Science, Service Science: Research and Innovations in the Service Economy. Springer Science+Business Media. doi:10.1007/978-1-4614-2326-3.
  • . The NIST Definition of Cloud Computing". National Institute of Standards and Technology. Retrieved 24 July 2011.
  • . Amazon Web Services. 2013-3-19. Retrieved 2013-3-20.
  • . Baburajan, Rajani, "The Rising Cloud Storage Market Opportunity Strengthens Vendors," infoTECH, August 24, 2011". It.tmcnet.com. 2011-08-24. Retrieved 2011-12-02.
  • . Oestreich, Ken, (2010-11-15). "Converged Infrastructure". CTO Forum. Thectoforum.com. Retrieved 2011-12-02.
  • . Strachey, Christopher (June 1959). "Time Sharing in Large Fast Computers". Proceedings of the International Conference on Information processing, UNESCO. paper B.2.19: 336–341.
  • . Simson Garfinkel (3 October 2011). "The Cloud Imperative". Technology Review (MIT). Retrieved 31 May 2013.
  • . Ryan; Falvey; Merchant (October 2011). "Regulation of the Cloud in India". Journal of Internet Law 15 (4)
  • . July, 1993 meeting report from the IP over ATM working group of the IETF". CH: Switch. Retrieved 2010-08-22.
  • . Corbató, Fernando J. "An Experimental Time-Sharing System". SJCC Proceedings. MIT. Retrieved 3 July 2012.
  • . "Jeff Bezos' Risky Bet". Business Week
  • . "Amazon's early efforts at cloud computing partly accidental". IT Knowledge Exchange. Tech Target. 2010-06-17
  • . B Rochwerger, J Caceres, RS Montero, D Breitgand, E Elmroth, A Galis, E Levy, IM Llorente, K Nagin, Y Wolfsthal, E Elmroth, J Caceres, M Ben-Yehuda, W Emmerich, F Galan. "The RESERVOIR Model and Architecture for Open Federated Cloud Computing", IBM Journal of Research and Development, Vol. 53, No. 4. (2009)
  • . D Kyriazis, A Menychtas, G Kousiouris, K Oberle, T Voith, M Boniface, E Oliveros, T Cucinotta, S Berger, "A Real-time Service Oriented Infrastructure", International Conference on Real-Time and Embedded Systems (RTES 2010), Singapore, November 2010
  • . Keep an eye on cloud computing, Amy Schurr, Network World, 2008-07-08, citing the Gartner report, "Cloud Computing Confusion Leads to Opportunity". Retrieved 2009-09-11.
  • . Gartner Says Worldwide IT Spending On Pace to Surpass Trillion in 2008, Gartner, 2008-08-18. Retrieved 2009-09-11.
  • . "Launch of IBM Smarter Computing". Retrieved 1 March 2011.
  • . Andreas Tolk. 2006. What Comes After the Semantic Web - PADS Implications for the Dynamic Web. 20th Workshop on Principles of Advanced and Distributed Simulation (PADS '06). IEEE Computer Society, Washington, DC, USA
  • . "Cloud Computing: Clash of the clouds". The Economist. 2009-10-15. Retrieved 2009-11-03.
  • . "Gartner Says Cloud Computing Will Be As Influential As E-business". Gartner. Retrieved 2010-08-22.
  • . Gruman, Galen (2008-04-07). "What cloud computing really means". InfoWorld. Retrieved 2009-06-02.
  • . "The economy is flat so why are financials Cloud vendors growing at more than 90 percent per annum?". FSN. March 5, 2013.
  • . Figure 8, "A network 70 is shown schematically as a cloud", US Patent 5,485,455, column 17, line 22, filed Jan 28, 1994
  • . Figure 1, "the cloud indicated at 49 in Fig. 1.", US Patent 5,790,548, column 5 line 56-57, filed April 18, 1996
  • . Antonio Regalado (31 October 2011). "Who Coined 'Cloud Computing'?". Technology Review (MIT). Retrieved 31 July 2013.
  • . HAMDAQA, Mohammad (2012). Cloud Computing Uncovered: A Research Landscape. Elsevier Press. pp. 41–85. ISBN 0-12-396535-7.

Abstract Views: 260

PDF Views: 0




  • Congestion Control and Protected Broadcast of Data Using FTP and TELNET in a Cloud Network

Abstract Views: 260  |  PDF Views: 0

Authors

Kapil Vyas
Career Point University, Kota, Rajasthan, India
Tarun Shrimali
JRN Vidyapeeth University, Udaipur, Rajasthan, India

Abstract


This paper presenting all security issue related to an open network. When two parties communicate in insecure environment that time all the private information is accessed by unauthorized user or client so, if a network have a proper security on all devices or secure private information and restricted unauthorized activity or access. The main aims of this paper enhance the security in network when two parties communicate or transfer the information. We need to work with many security techniques and ways by which we can prepare a secure network model for user authentication. The security architecture of network protocol widely accepted as being a good abstraction for network device and user security functionality. Significant work has been done to develop efficient techniques for network security, but most of the work has concentrated on securing protocol over congestion control. The base of work is providing security when network is distributed and based on cloud network. FTP and TELNET is enhancing security in network for user authentication and secure the entire device when two or more nodes communicate. The design method is referred to as network security design depend on protocol. Protocol security allows us to make better secure of network and all network devices by FTP and TELNET security protocol. This technique restricts unauthorized user or unwanted activity by third party.

Keywords


Congestion Control Protected Broadcast, FTP, TELNET, Cloud Network, Securing Cloud Network.

References