Proposing a Deductive Security Interface to Identify Malfunctioning of Authenticated Users in network Applications and in Cloud Environment

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2016 by IJCTT Journal
Volume-33 Number-1
Year of Publication : 2016
Authors : Dr. Amit Chaturvedi, Rajesh Kumar Pandey
  10.14445/22312803/IJCTT-V33P104

MLA

Dr. Amit Chaturvedi, Rajesh Kumar Pandey "Proposing a Deductive Security Interface to Identify Malfunctioning of Authenticated Users in network Applications and in Cloud Environment". International Journal of Computer Trends and Technology (IJCTT) V33(1):20-24, March 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Security of Application’s data is a major concern when a user works with network and cloud based applications. cloud computing is very popular these days for web based application development. In cloud environment, the developer used the resources on pay per use basis i.e. the resources are on hired basis. The cloud computing also introduces thrust of security for the developers and Users, these thrusts may be System vulnerable, Malware & Viruses, Data Security, Deductive scheme technique in the Cloud computing domain. In this research paper, we have proposed an extra layer of security interface in application layer in the layered architecture security. Basic idea behind this proposed Interface is that, providing an extra layer of security to application and alerts to the user as well as organization network administrator or security department with details information like user Id/ password , IP address , Time of access etc.

References
[1] P. Mell, T. Grance, The NIST definition of cloud computing, National Institute of Standards and Technology Special Publication 800–145, 2011.
[2] Youssef, A.E. (2012). Exploring Cloud Computing Services and Applications. Journal of Emerging Trends in Computing and Information Sciences
[3] JianhuaChea*, YaminDuanb, Tao Zhanga, JieFanaStudy on security models and strategies of cloud computing 2011 www.elesevier.com
[4] CSA, Security Guidance for Critical areas of focus in Cloud Computing 2011.
[5] Bisong, A. and Rahman, S.S.M. AnOverview ofthe Security Concerns in Enterprise Cloud Computing. International Journal of Network Security & Its Applications.2011
[6] Yuyu Chou , Olga Levina, Jan Oetting ,“Enforcing Confidentiality in a SaaS Cloud environment”, 19th Telecommunications forum TELFOR 2011,
[7] D.Sureshkumar , R. Jagadeesh KannanMulti tenancy Deploy Model and Issues in SAAS: A SurveyThe International Journal of Computer Science & Applications (TIJCSA) 2013
[8] Gong, C., Liu, J., Zhang, Q., Chen, H., Gong, Z., 2010. The characteristics of cloud computing. In: Proceedings of the 2010 39th International Conference on Parallel Processing Workshops, IEEE Computer Society, Washington, DC, USA.
[9] J. Viega and McAffee, “Cloud Computing and the Common Man,”Published by the IEEE Computer Society. 2009.
[10] T. Mather, S. Kumaraswamy, and Sh. Latif, “Cloud Security andPrivacy”, Published by O’Reilly Media, September 2009.
[11] Rashmi, Sahoo, G. and Mehfuz, S. Securing Software as a Service Model of Cloud Computing: Issues and Solutions. International Journal on Cloud Computing: Services and Architecture, 2013
[12] Han, J., Susilo, W. and Mu, Y. (2013). Identity-based data storage in cloud computing. Future Generation Computer Systems,
[13] Zhang Y, Liu S, Meng X Towards high level SaaS maturity model: methods and case study. In: Services Computing conference. APSCC, IEEE Asia-Pacific, 2009
[14] Chandramouli R, Mell P (2010) State of Security readiness.
[15] Jaeger T, Schiffman J (2010) Outlook: cloudy with a chance of Security Challenges and improvements. IEEE Security Privacy
[16] Wayne J. Brown, Vince Anderson, Qing Tan “Multi-tenancy - Security Risks and Countermeasures” 15th International Conference on Network-Based Information Systems, IEEE 2012
[17] Yichuan Zhang, Bin Zhang, Ying Liu, “A Method of SaaS Multi-Tenant Model Recommendation Based on Graph Matching”.
[18] Khorshed, T.M., Ali, A.B.M.S. and Wasimi, S.A. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Generation Computer Systems, 2012
[19] Atayero, A.A. and Feyisetan, O. (2011). Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption. Journal of Emerging Trends in Computing and Information Sciences,
[20] Varia, J., Mathew, S..Overviewof amazon web services. http://aws.amazon.com/whitepapers; 2013
[21] http://www.openssl.org/docs/OpenSSL, http://www.openssl.org/docs/, [visited: January 2009].
[22] RSA Security, Inc. “BSAFE: A Cryptographic Toolkit”, Library Reference Manual Version 4.0 http://www.rsa.com/products/bsafe/documentation /cryptoc_411_ reference.pdf.
[23] SUN Corporation, “Java Cryptographic Extensions (JCE)”, www.sun.com, [visited: February 2009].
[24] Microsoft Corporation, “Cryptographic Services Provider (CSP)”, www.microsoft.com, [visited: February 2009].
[25] FIPS PUB 201-1, “Personal Identity Verification (PIV) of Federal Employees and Contractors”, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, March 2006
[26] Adams, S. Farrell, T. Kause, T. Mononen, “RFC 4210, Internet X.509 Public Key Infrastructure Certificate Management Protocol”, September 2005.
[27] J. Linn, “Generic Security Service Application Program Interface”, RFC-2743, RSA Laboratories, January 2000.

Keywords
Cloud Computing, Layered Architecture, Deductive Secure Interface , Network , Cloud base Application, IaaS, SaaS, Cloud Security, Security Policy, Cloud Risk.