Back to Search Start Over

Cloud Security Service for Identifying Unauthorized User Behaviour.

Authors :
David, D. Stalin
Anam, Mamoona
Kaliappan, Chandraprabha
Selvi, S. Arun Mozhi
Sharma, Dilip Kumar
Dadheech, Pankaj
Sengan, Sudhakar
Source :
Computers, Materials & Continua; 2022, Vol. 70 Issue 2, p2581-2600, 20p
Publication Year :
2022

Abstract

Recently, an innovative trend like cloud computing has progressed quickly in InformationTechnology. For a background of distributed networks, the extensive sprawl of internet resources on the Web and the increasing number of service providers helped cloud computing technologies grow into a substantial scaled Information Technology service model. The cloud computing environment extracts the execution details of services and systems from end-users and developers. Additionally, through the system's virtualization accomplished using resource pooling, cloud computing resources become more accessible. The attempt to design and develop a solution that assures reliable and protected authentication and authorization service in such cloud environments is described in this paper. With the help of multi-agents, we attempt to represent Open-Identity (ID) design to find a solution that would offer trustworthy and secured authentication and authorization services to software services based on the cloud. This research aims to determine how authentication and authorization services were provided in an agreeable and preventive manner. Based on attack-oriented threat model security, the evaluation works. By considering security for both authentication and authorization systems, possible security threats are analyzed by the proposed security systems. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
15462218
Volume :
70
Issue :
2
Database :
Complementary Index
Journal :
Computers, Materials & Continua
Publication Type :
Academic Journal
Accession number :
152705416
Full Text :
https://doi.org/10.32604/cmc.2022.020213