Efficient Cloud Environment to Improve User Authentication to Prevent Cyber Attacks Using DSA over AES
نویسندگان
چکیده
To provide an efficient cloud environment for secured based users to improve user authentication and storage security prevent cyber attacks on Digital Signature Algorithm (DSA) over Novel Advanced Encryption Standard (AES). Sample dataset considered both algorithms were N=10 iterated by G power 80%, threshold 0.05%, CI 95% mean standard deviation. Split size of training test is 70% 30% respectively. The sigmoid function used in DSA maps value between 0 1 which helps prediction accuracy percentage. has significantly better (80.7%) compared AES (59%) attained significance 0.004 (p<0.05). algorithm predicting with percentage AES.
منابع مشابه
User Authentication Platform using Provisioning in Cloud Computing Environment
Cloud computing is a computing environment centered on users and can use programs or documents stored respectivily in servers by operating an applied software such as Web browser through diverse devices on where users can access Internet as an on-demand outsourcing service of IT resources using Internet. In order to use these cloud computing service, a user authentication is needed. This paper ...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملComprehensive Solution to Mitigate the Cyber-attacks in Cloud Computing
Cloud computing is a web based utility model. Cybercrimes effecting web based system are equally applicable in the cloud computing. Considering the sensitivity and the damage that can be caused by cybercrimes, this work is an effort to study the various cyber threats and methods to mitigate them. Firstly, it highlights the cloud usage as per the various services model (IaaS, PaaS, and SaaS) and...
متن کاملAn Authentication Mechanism to prevent SQL Injection Attacks
SQL Injection attacks target databases that are accessible through a web front-end, and take advantage of flaws in the input validation logic of Web components such as CGI scripts.In the last few months application-level vulnerabilities have been exploited with serious consequences by the hackers have tricked e-commerce sites into shipping goods for no charge, usernames and passwords have been ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Advances in parallel computing
سال: 2022
ISSN: ['1879-808X', '0927-5452']
DOI: https://doi.org/10.3233/apc220047