Abstract

Security is a critical factor for any of the computing platforms. Cloud computing is a new computing environment but still, its basic technology is the Internet. Thus, Cloud computing environment not only has the threats of its own but it is also prone to security issues of its underlying technology i.e. Internet. In this paper, the authors are proposing a secure routing framework viz. Authenticated Dynamic Routing in Cloud Networks (ADRCN) to mitigate the malicious insider attacks while maintaining the path integrity in the Clouds. Symmetric cryptography with hashing is used to maintain the integrity of the path between the source and destination. The purpose of ADRCN is to maintain the integrity of the path between the client and data center. If malicious insider tries to perform an attack between the client and the data center then it will be detected. This work aims to give a solution for detection and prevention of malicious insider attacks in Cloud-based environments.

Highlights

  • The Cloud computing and big data are future of the software service model (Tamura, 2017)

  • Authenticated Dynamic Routing in Cloud Networks (ADRCN) assures that 1) the destination of the route discovery process is capable of verifying the initiator, 2) the initiator is capable to verify the intermediate devices, and 3) no intermediate device can make any alteration to the device list in Client Route Request (CRREQ) or Client Route Reply (CRREP) message

  • When any router or device sends a request for the path establishment the request is fulfilled according to the ADRCN framework

Read more

Summary

Introduction

The Cloud computing and big data are future of the software service model (Tamura, 2017). In spite of using security measures at the Cloud end transmission of data is still done using Internet technology. Cloud Networks (ADRCN) Authenticated Dynamic Routing in Cloud Networks (ADRCN) is on-demand secure routing framework. It provides protection against capricious dynamic attackers. It has the capability to prevent the tampering with uncompromised routes and to prevent the attackers. The security of this framework depends on the secrecy and authenticity of keys which are kept at the connecting devices. ADRCN uses two-step processes for its working: i) Route discovery, and ii) Route maintenance

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.