You can view the full text of this article for free using the link below.

Title: Bi-level user authentication for enriching legitimates and eradicating duplicates in cloud infrastructure

Authors: R. Thandeeswaran; M.A. Saleem Durai

Addresses: School of Information Technology and Engineering, VIT University, Vellore, Tamilnadu, India ' School of Computer Science and Engineering, VIT University, Vellore, Tamilnadu, India

Abstract: Ease of usage of cloud computing leads to an exponential growth in all sectors. Exponential growth always attracts duplicates to consume and deplete resources. Cloud is not exempted from invaders and overwhelming the resource utilisation thereby availability become a threat. Availability issue arises due to multiple requests towards the same victim, a DDoS attack. Hence, the major concern in the cloud is to rightly identify legitimates, and providing the required services all time go by avoiding DDoS attacks. Multiple techniques are available to identify and authenticate the users. This paper not only just tries to authenticate the users but also works on eliminating the invaders in two fold. In the first phase, the user ID is scrambled in four different steps. In the second phase, the users are authenticated depending on the credits. Based on the traffic flow (in the case of network level attack) and on the interval between consequent service requests (in the case of service level attack), users are authenticated upon which services are provisioned accordingly. The simulation results presented here exhibits the strength of the proposed method in detection and prevention of DDoS attack in cloud computing environment.

Keywords: DDoS attack; SSID; authentication; credits; cloud environment; legitimate; attackers.

DOI: 10.1504/IJCAET.2020.103836

International Journal of Computer Aided Engineering and Technology, 2020 Vol.12 No.1, pp.95 - 112

Received: 12 May 2017
Accepted: 24 May 2017

Published online: 27 Nov 2019 *

Full-text access for editors Access for subscribers Free access Comment on this article