Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/310624
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | ||
dc.date.accessioned | 2021-01-05T11:37:23Z | - |
dc.date.available | 2021-01-05T11:37:23Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/310624 | - |
dc.description.abstract | Although there are several advantages, some newlineobstacles limit the use of cloud computing. One of the crucial issues to newlineconsider when adopting cloud is security. newlineThe cloud environment should be developed such that to ensure newlinesafety and security. In the absence of initial client-side server newlineinvestments and low cost on the provider side, eliminating security newlineproblems and providing a strong authentication framework, it will be newlineamong the most successful paradigms. In this research work, a new newlineframework has been proposed for enhancement of the access control newlinemechanism that only allows authenticated users. newlineThe researcherand#8223;s proposed infrastructure provides strong newlineauthentication to control access to resources. Strong authentication goes newlinethrough what you know (User name, password), what you have (NTP newlineserver session key) and what you are (biometric). By the combination of newlinepassword-based, biometric-based, and time-based authentication, this newlineframework provides Type 1, 2 and 3 authentications that accurately newlineidentify the true positive, with less complexity. The framework manages newlineerrors from network delays and jitter. It increases security by newlineeliminating false negatives. newlinevi newlineThe proposed methodology for the research takes into newlineconsideration only the relevant appropriate parameters among the newlinemultitude of the given parameters, which enable proof for a user as an newlineauthenticated person. The criterion for selecting the suitable parameters newlineis the use of PCA (Principal Component Analysis). PCA technique is newlineused for reducing the dimensionality of a multivariate dataset with newlineminimal loss of information. Log details maintained in the server are newlineused for avoiding degradation in the system performance and newlinemonitoring critical events. The number of login attempts failed prevents/ newlinereduces the data thefts. So in this work, it is given topmost priority for newlineauthentication. newlineIn the researcherand#8223;s work, from the available supervised learning newlinealgorithms, SVM (Support Vector Machine) is used to classify newlineauthenticated and unauthenticated users accurately. SVM | |
dc.format.extent | 181 | |
dc.language | English | |
dc.relation | ||
dc.rights | university | |
dc.title | Strong Authentication Framework For Cloud Environments | |
dc.title.alternative | ||
dc.creator.researcher | NALINI,S | |
dc.subject.keyword | Computer Science | |
dc.subject.keyword | Computer Science Information Systems | |
dc.subject.keyword | Engineering and Technology | |
dc.description.note | ||
dc.contributor.guide | Andrews,J | |
dc.publisher.place | Chennai | |
dc.publisher.university | Sathyabama Institute of Science and Technology | |
dc.publisher.institution | COMPUTER SCIENCE DEPARTMENT | |
dc.date.registered | 2013 | |
dc.date.completed | 2019 | |
dc.date.awarded | 2020 | |
dc.format.dimensions | A5 | |
dc.format.accompanyingmaterial | DVD | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | COMPUTER SCIENCE DEPARTMENT |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
10 chapter 5.pdf | Attached File | 228.98 kB | Adobe PDF | View/Open |
11 chapter 6.pdf | 636.88 kB | Adobe PDF | View/Open | |
12 chapter 7.pdf | 468.48 kB | Adobe PDF | View/Open | |
13 chapter 8.pdf | 532.64 kB | Adobe PDF | View/Open | |
14 chapter 9.pdf | 325.11 kB | Adobe PDF | View/Open | |
15 references.pdf | 382.23 kB | Adobe PDF | View/Open | |
16 curriculam vitae.pdf | 317.11 kB | Adobe PDF | View/Open | |
17 evaluation reports.pdf | 3.77 MB | Adobe PDF | View/Open | |
1 title.pdf | 131.48 kB | Adobe PDF | View/Open | |
2 certificate.pdf | 998.53 kB | Adobe PDF | View/Open | |
3 acknowledgement.pdf | 138.04 kB | Adobe PDF | View/Open | |
4 abstract.pdf | 379.95 kB | Adobe PDF | View/Open | |
5 table of content.pdf | 343.58 kB | Adobe PDF | View/Open | |
6 chapter 1.pdf | 487.16 kB | Adobe PDF | View/Open | |
7 chapter 2.pdf | 546.31 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 325.11 kB | Adobe PDF | View/Open | |
8 chapter 3.pdf | 396.33 kB | Adobe PDF | View/Open | |
9 chapter 4.pdf | 483.05 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: