Open Access Open Access  Restricted Access Subscription Access

Network as a Service Model in Cloud Authentication by HMAC Algorithm


Affiliations
1 Department of Computer Science and Engineering, YSR Engineering College of Yogi Vemana University Proddatur Kadapa, Andhra Pradesh, 516360, India
2 Department of Computer Science and Engineering, Bapatla Engineering College, Bapatla, AP, 522101, India
 

Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud. Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%, and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to securing from attackers.

Keywords

Authentication, Attacks, Cloud, Cryptography, Protocols, Router, Security.
User
Notifications
Font Size


  • Network as a Service Model in Cloud Authentication by HMAC Algorithm

Abstract Views: 336  |  PDF Views: 0

Authors

Bommala Harikrishna
Department of Computer Science and Engineering, YSR Engineering College of Yogi Vemana University Proddatur Kadapa, Andhra Pradesh, 516360, India
S. Kiran
Department of Computer Science and Engineering, YSR Engineering College of Yogi Vemana University Proddatur Kadapa, Andhra Pradesh, 516360, India
K. Mani Deep
Department of Computer Science and Engineering, Bapatla Engineering College, Bapatla, AP, 522101, India

Abstract


Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud. Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%, and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to securing from attackers.

Keywords


Authentication, Attacks, Cloud, Cryptography, Protocols, Router, Security.

References