CFP last date
20 December 2024
Reseach Article

MCSAuth: A New Authentication Mechanism for Cloud Systems

by Francois S. N. Athanasios, Sherif F. Fahmy, Gamal I. Selim
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 88 - Number 15
Year of Publication: 2014
Authors: Francois S. N. Athanasios, Sherif F. Fahmy, Gamal I. Selim
10.5120/15428-3934

Francois S. N. Athanasios, Sherif F. Fahmy, Gamal I. Selim . MCSAuth: A New Authentication Mechanism for Cloud Systems. International Journal of Computer Applications. 88, 15 ( February 2014), 23-32. DOI=10.5120/15428-3934

@article{ 10.5120/15428-3934,
author = { Francois S. N. Athanasios, Sherif F. Fahmy, Gamal I. Selim },
title = { MCSAuth: A New Authentication Mechanism for Cloud Systems },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 88 },
number = { 15 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 23-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume88/number15/15428-3934/ },
doi = { 10.5120/15428-3934 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:08:03.799634+05:30
%A Francois S. N. Athanasios
%A Sherif F. Fahmy
%A Gamal I. Selim
%T MCSAuth: A New Authentication Mechanism for Cloud Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 88
%N 15
%P 23-32
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing has attracted a lot of attention in both academia and industry lately. With its focus on scaling, collaboration, agility, availability and cost reduction, cloud computing offers a compelling alternative to in-house IT solutions. However, by "outsourcing" the computing infrastructure, it introduces a number of security issues. Specifically, since cloud computing is a shared computing platform, it needs to provide strong mechanisms for authenticating it's users and ensuring that no confidential information stored on the cloud is compromised. This paper addresses a number of vulnerabilities in existing authentication mechanisms and proposes enhancements to mitigate these vulnerabilities. In addition, the paper studies how these enhancements affect performance. The results show that the existing vulnerabilities can be overcome by the proposed mechanisms. However, this results, in the worst case, in a six-fold increase in execution time. This can be considered relatively small when security is prime important.

References
  1. Ramgovind, Eloff, and Smith, "The Management of security in Cloud Computing", Information Security for South Africa (ISSA), 2010.
  2. Gamal Ibrahim Selim, Sherif Fadel Fahmy, and François Samir Nicola, "A New Authentication Mechanism for Cloud Systems", Helwan University Engineering Journal 138, Mars 2013.
  3. Anthony Velte, Toby Velte, and Robert Elsenpeter, "Cloud Computing, A Practical Approach", McGraw Hill, 2012.
  4. Bhaskar Prasad Rimal, Eunmi Choi, and Jan Lumb, "A Taxonomy and survey of Cloud Computing System", INC, IMS and IDC, 2009.
  5. "Cloud Computing Alliance V2. 1", web site: http: // www. cloud security alliance. Org /.
  6. Bradley, Tony and Carvey, Harlan, "Essential Computer Security", Elsevier Science Ltd, 2006.
  7. James Haskett, "Pass-algorithms: a user validation scheme based on knowledge of secret algorithms", communications of the ASM, 27, No 8, PP 777 – 781, (1984).
  8. Anne Adams, Martina Angela Sasse and Peter Lunt: "Making passwords secure and usable", HCI 97 Proceedings of HCI on People and Computers XII, Springer-Verlag London. 1997.
  9. Mahbub Ahmed, Yang Xiang and Shawkat Ali, "Above the Trust and Security in Cloud Computing: A Notion towards Innovation", Embedded and Ubiquitous Computing (EUC), IEEE/IFIP 8th, 2010.
  10. Charles Paul Pfleeger and Shari Lawrence Pfleeger, "Security in Computing", Third Edition Prentice Hall Professional, 2003.
  11. Andrew Tanenbaum and Maarten Van Steen, "Distributed Systems: Principles and Paradigms", Second Edition Pearson Prantice Hall, 2007.
  12. Charlie Kaufman, Radia Perlman and Mike Speciner, "Network Security: private communication in a public world", Prentice Hall Press Upper Saddle River, NJ, USA, 2002.
  13. William Stallings, "Cryptography and Network Security Principles and Practices", Fourth Edition, Prentice Hall, 2005.
  14. Paul Garrett, "Making, Breaking Codes: An Introduction to Cryptology". Upper Saddle River, NJ, Prentice Hall, 2001.
  15. Doug Stinson, "Cryptography: Theory and Practice" Boca Raton, FL: CRC Press, 2005.
  16. Susan Landau, "Polynomials in the Nation's Service: Using Algebra to Design the Advanced Encryption Standard. " American Mathematical Monthly, 2004.
  17. James Nechvatal, Elaine Barker, Lawrence Bassham, William Burr, Morris Dworkin, James Foti, Edward Roback, "Report on the Development of the Advanced Encryption Standard", National Institute of Standards and Technology, 2000.
  18. William Stallings, "The Advanced Encryption Standard. " Cryptologia, 2002.
  19. Pardeep, Pushpendra Kumar Pateriya, "PC-RC4 Algorithm: An Enhancement Over Standard RC4 Algorithm" , International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 3, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Communication networks Cloud Computing Authentication Hybrid Encryption Keyed hash.