Abstract

Every user appreciates the security of their datairrespective of its sensitivity. At the same time, user does not wantto be held up with the legacy systems, which may be stronglysecured but not with fantasy. Network travelled many phases of itsown such as internet, intranet, wireless network, sensor network,Ad-hoc network, Mobile network, Blue-tooth, Cloud and IoT, themost popular technique now. Hence, whatever the type of networkhitting the end user with improvised quality, get compromised insecurity.People feel pleasure upon sharing their moments with theirconnections. Huge amount of data are in transit either by means ofstoring them in cloud or retrieving. Users lose control over theirdata, they are unaware about the people accessing and modifying.Hence DataCentres have to be protected from unauthorized illegalaccess. Illegal data access may be initiated by a boot or a bot. Manor a Machine discrimination has been resolved with CAPTCHA.This paper, DPCA, proposes an authentication at two differentphases. In the first phase, the user is authenticated with the newtype of CAPTCHA. With this methodology, user is segregated asman or machine. Thereby bot-nets are filtered out and the floodingmessages from bots are mitigated. In the second phase, where onlyman is allowed to access the cloud resources, he is authenticatedwith Dempster Shafter hypothetical approach combined with theuser intent and not the content. DPCA has been tested in theinfrastructure and the experimental results proved the strength ofthe algorithm.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.