Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System



Similar documents
MULTI-DIMENSIONAL PASSWORD GENERATION TECHNIQUE FOR ACCESSING CLOUD SERVICES

Implementation of Multifactor Authentication System for Accessing Cloud Service

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May ISSN

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

An Architecture Model of Sensor Information System Based on Cloud Computing

A NOVEL GRAPHICAL PASSWORD APPROACH FOR ACCESSING CLOUD & DATA VERIFICATION

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April ISSN

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

Public Cloud Partition Balancing and the Game Theory

LOAD BALANCING STRATEGY BASED ON CLOUD PARTITIONING CONCEPT

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

A Cloud Computing Architecture with Wireless Sensor Networks for Agricultural Applications

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud

2 Prof, Dept of CSE, Institute of Aeronautical Engineering, Hyderabad, Andhrapradesh, India,

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION

A Survey on Load Balancing and Scheduling in Cloud Computing

A Survey Paper: Cloud Computing and Virtual Machine Migration

A Road Map on Security Deliverables for Mobile Cloud Application

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Models of Load Balancing Algorithm in Cloud Computing

Identifying Data Integrity in the Cloud Storage

Implementation of Load Balancing Based on Partitioning in Cloud Computing

Privileged Cloud Storage By MaaS JuJu

Efficient Data Transmission For Wireless Sensor Networks

A Catechistic Method for Traffic Pattern Discovery in MANET

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

An Intelligent Approach for Data Fortification in Cloud Computing

A Game Theoretic Approach for Cloud Computing Infrastructure to Improve the Performance

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

ABSTRACT. KEYWORDS: Cloud Computing, Load Balancing, Scheduling Algorithms, FCFS, Group-Based Scheduling Algorithm

Cloud Computing Security Issues And Methods to Overcome

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

On Cloud Computing Technology in the Construction of Digital Campus

CDBMS Physical Layer issue: Load Balancing

A Survey on Load Balancing Techniques Using ACO Algorithm

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

5 International Journal of Scientific & Engineering Research, Volume Ŝǰȱ ȱřǰȱ ȬŘŖŗśȱȱ ISSN

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

Cloud Computing Services and its Application

E-LEARNING DEVELOPMENT AS PUBLIC INFRASTRUCTURE OF CLOUD COMPUTING

A Survey on Cloud Security Issues and Techniques

A Survey on Software as a Service (Saas) Cloud for Programming Language Computing

Investigation of Cloud Computing: Applications and Challenges

Cloud Web-Based Operating System (Cloud Web Os)

Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop

Dynamic Query Updation for User Authentication in cloud Environment

Private Cloud in Educational Institutions: An Implementation using UEC

Security Model for VM in Cloud

Security Considerations for Public Mobile Cloud Computing

Mobile Hybrid Cloud Computing Issues and Solutions

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

A Game Theory Modal Based On Cloud Computing For Public Cloud

Role of Cloud Computing in Education

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

Cloud Based E-Government: Benefits and Challenges

Load Balancing Algorithms in Cloud Environment

Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks

A Study of Data Management Technology for Handling Big Data

International Journal of Advanced Research in Computer Science and Software Engineering

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

How To Understand Cloud Computing

Last Updated: July STATISTICA Enterprise Server Security

Effective Load Balancing Based on Cloud Partitioning for the Public Cloud

MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING. K.Sireesha 1 and S. Suresh 2

The International Journal Of Science & Technoledge (ISSN X)

ADAPTIVE LOAD BALANCING FOR CLUSTER USING CONTENT AWARENESS WITH TRAFFIC MONITORING Archana Nigam, Tejprakash Singh, Anuj Tiwari, Ankita Singhal

A Comparative Study of Load Balancing Algorithms in Cloud Computing

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART

Internet Video Streaming and Cloud-based Multimedia Applications. Outline

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India

The Load Balancing Strategy to Improve the Efficiency in the Public Cloud Environment

@IJMTER-2015, All rights Reserved 355

A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment

CLOUD COMPUTING PARTITIONING ALGORITHM AND LOAD BALANCING ALGORITHM

A Study of Network Security Systems

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

Transcription:

Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System Dinesha H A Crucible of Research and Innovation PES Institute of Technology BSK 3 rd Stage Bangalore-85 R Monica M.Tech in Software Engg.. PES Institute of Technology BSK 3 rd Stage, Bangalore-85 V.K Agrawal Director, CORI PES Institute of Technology BSK 3 rd Stage, Bangalore-85 ABSTRACT Recent developments in sensor networking emphasized the need for integration of sensor networks with the cloud. This improves the processing power and battery life of the sensor nodes. Once the sensor data is routed to the cloud, possible measures need to be adopted to secure the sensor data. Thus, strict authentication checks have to be provided to facilitate authorized customers to utilize the services provided by the cloud in the form of sensor data. In this paper, we present an authentication system by employing the multi-level authentication technique in securing the sensor data in cloud. This technique generates/authenticates the password in multiple levels to access cloud services. Thus, the proposed scheme helps in improving the authentication level by order of magnitude as compared to the existing technique. We modeled the proposed system using Petri nets. General Terms Cloud Computing, Sensor Network, Security Keywords Ant colony routing algorithm, multi-level authentication technique, sensor cloud integration. 1. INTRODUCTION Recent advances in electronic and computer technologies have paved the way for the proliferation of wireless sensor networks (WSN) [1]. WSNs are autonomous systems consisting of tiny sensors. These are associated with integrated sensing, limited battery lifetime, resource constraints and limited range. The limited battery lifetime limitation can be overcome by integrating the WSNs and cloud computing technology. The cloud technology is an internet-based model which enables convenient and ondemand network access to a shared pool of configurable computing resources [2]. Various services such as, software, hardware, data storage and infrastructure are provided over internet. These are accessed from web browsers, desktop and mobile applications. Cloud Computing Technologies which are grouped into 4 different services that are depicted in figure 1 as SaaS, DSaaS, IaaS and PaaS [3]. Cloud Computing DsaaS Technology [3] provides scalable resources to store the sensor data and make that data available on demand. Since wireless sensor networks are limited in their processing power, battery life and communication speed, cloud computing offers the DsaaS service. This makes sensor data available for long term observations and for shared use of data and services in different kind of projects or analysis. Figure 1: Services provided by cloud computing In order to allow the flow of sensor data to cloud server [4], we propose to use ant colony routing algorithm [5] [6] [7]. This helps in establishing the shortest path between the sensor network and cloud server through an appropriate gateway [8]. Once the sensor data is uploaded to the cloud, it requires appropriate mechanisms for delivering the data only to the authorized users [4]. In this paper, we propose to use an authentication technique, called as multi-level authentication technique. This technique authenticates the cloud access in multiple levels. To break the authentication, one has to know the login details of all the levels. Here, in this paper, we use formal modeling for our system to precisely discuss the availability of the cloud services for the intended users, along with the provision of appropriate modeling [10], algorithm and formulations. Thus, we expect, with this proposed technique the probability unauthorized accesses can be greatly reduced. This paper is organized as follows: Section 2 discusses the multi-level authentication technique for securing sensor data. Section 3 provides the system architecture and an algorithm along a probability theory for the proposed multi-level password authentication in sensor-cloud integration system. Section 4 deals with the system modeling. This has various sub sections which involves activity diagram and Petri nets based model for the complete multi-level password generation technique for sensor-cloud integration application. Finally, the paper is concluded in section 5. 16

2. MULTILEVEL AUTHENTICATION TECHNIQUE FOR SECURING SENSOR DATA To access the sensor data from cloud, we are using multi-level authentication technique. This technique authenticates the cloud access in multiple levels. It generates the password and concatenates the generated- password at multiple levels. Based on the leaf level- concatenated -password, one can access the cloud services provided that the password authentication is successful in all the previous levels [11]. Fig. 2 shows the architecture of multi-level password generation technique. This architecture helps in checking the authentication against the services and privileges. It also helps to ensure which customer has what kind of privileges to use the sensor data in the cloud. This is evaluated by multiple levels authentications, where authentication activities take place in organization, team and user levels. First level of authentication is organization level password authentication/generation. It is for ensuring the cloud access authentication from cloud vendor. If unauthenticated organization or hackers tries to access the data in the cloud, they would be terminated in this level itself. The second level of authentication is a team level password authentication/ generation. It is to authenticate the team for particular cloud service. Likewise, based on the system requirements, authentication system can have even further n levels. Finally, the last level will be the user level password authentication/generation, which ensures that customer/end user has particular privileges and permission to access the data [11]. data is clearly depicted. As seen in the above figure 3, the sensor network has the ability to sense the environment, process the captured data and deliver it to the destinationwhich is nothing but the base station, for which we using zone based ant colony optimization technique [9]. Through an appropriate gateway the sensor node can be integrated with the cloud. The data packets from the sensor network can be routed efficiently to the cloud server using ant colony routing technique [12]. This finally relieves the burden of the sensor nodes to some extent and improves the processing power and battery life. Along with the provision of storage service offered to the sensor data, security services are also provided by the cloud servers. The security mechanisms are provided with the help of multi-level authentication technique which authenticates the cloud access in multiple levels. This technique provides authentication activities at organization, team and user levels. One can deploy applications more rapidly across shared server and storage resource pools than is possible with conventional enterprise solutions. Figure 2: Proposed multi-level authentication technique for securing sensor data 3. SYSTEM ARCHITECTURE Proposed system architecture shown in Figure 3, where the provision security of multi-level authentication to the sensor Figure 3: System Architecture of the Proposed Cloud computing based sensor data analysis environment Algorithm: Multilevel authenticated cloud sensor integration 17

3.1 Proposed Algorithm The algorithm for the complete multi-level password authentication/generation technique for securing sensor data is discussed in this section. Important notations being used in the algorithms are: CH- Cluster head, BS - Base station, CS - Cloud server, SA-service authentication, TA- team authentication and PA- privilege authentication. Initially, the sensor data is processed, routed and uploaded to the servers of the cloud which provide access only to authenticated users. For this purpose, we have proposed Multi-level authentication technique. Multi-level authentication system reads the details given by organization, team and user and produces the password output at different levels. These are discussed as follows: Step 1: Sensors would process & route the data packets to CH Step 2: CH collects data packets and route it to the BS Step 3: The routed data would be collected by the BS and upload the information to the CS Step 4: CS acts as a repository to store the info & provides access only to authenticated users. Step 5: Authentication check: Multi-level authentication checks then SA - Organization level password generation Authentication at level 0. If SA is authenticated organization TA - Team level password generation Authentication at level 1. If TA is authenticated then. PA User level password generation Authentication at level n. If PA is authenticated user then Password = Concatenate L0, L1.Ln If password privileged authenticated then Then Provide access to the sensor data in the cloud End Step 6: Exit Else Go to step 6 3.2 Probability of Breaking Multi-Level Authentication Probability of breaking multi-level authentication to access sensor data from cloud can be formulated by using the probability theory. According to this technique, one has to know the password of all the levels in order to access the required sensor data. According to this scheme, the authentication is provided at n levels for which we have N1*N2 *Nn possible options. Therefore, the probability of hacking correct password is 1/N1*N2*N3 *Nn =>1/Nn as given in [11]. 4. SYSTEM MODELING This section presents an activity diagram for multi-level authentication technique for securing sensor data in the cloud. We also provide a Petri net model for the proposed algorithm in the preceding section. The model helps in understanding and analyzing the proposed authentication system. 4.1 Activity Diagram of Multi-level Authentication Process The proposed system activity diagram provides the clear picture of the activities of rendering security to the sensor data uploaded to the cloud servers. The security is provided using multi-level authentication system. At the first phase of this process the sensors would process the data and route it to the cluster head. This in turn would collect the data and route it to the base station which would upload the huge amount of the integrated data to the cloud. The servers of the cloud provide secure access to the information only to the authenticated users. The authentication activities provided by the cloud take place in organization, team and user levels. First, activity happens at organization level. It reads the authentication password and checks to authenticate the organization for cloud access and then it enters into a second level authentication. The second activity happens at team level. It reads the team login details and checks for authentication. Once it is done; it then enters into a user level authentication. User level activity reads the authentication information to check for the user permission and privileges. 18

Process the sensor data Read & Integrate the data collected from various sensors Collect the integrated packets from the cluster head Route the data packets to the cluster head Route the integrated data to the base station Sensors Cluster Head Base Station A Repository which would store the routed information Read the organization details Cloud Service Provider Provide access only to authenticated users Upload the huge sensor data information to the cloud service provider Read team details to generate team password Organization Send the generated organization password to teams Team Read user details to generate PA, Concatenate with SA & TA Send generated team password to individual team member User Figure 4: Activity diagram for secured sensor cloud integration using multilevel authentication technique 4.2 System Modeling Using Petri Nets The system modeling is done using Petri nets, which are vividly portrayed in figure 5. Petri nets are a special form of bipartite directed graph represented by < P, T, In, Out> [10], in which Place (denoted as p) and Transitions (denoted as t) are disjoint sets of nodes, and In and Out are sets of edges. We carry out formal modeling for our system to precisely discover when the user can and cannot access the services of the cloud. The model is explained as follows. As shown in figure 5, the sensor data are accessed in round robin fashion represented by places p1, p2, p3 and p4 and transitions t1, t2, t3 and t4. The sensor data are represented by places p5, p6, p7 and p8. The availability of data is indicated by the presence of tokens in these places. When the cluster head is ready, it puts a token at cluster ready place p9. This enables the required sensor data to be passed on to the sensor data queue. Similarly, when base station is ready to receive the data, it provides a token at ready place p15. The base station data are further passed on to cloud server for data storage. When a client request arrives for the token at place at p16, the system starts validating the authentication word at p19, p20 and p22 levels. 19

5. CONCLUSION AND FUTURE ENHANCEMENT In this paper, Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System is done. It is expected to help in the analysis and provision of authenticated access to the data in the sensor-cloud integration system. We have described this authentication system by employing the multi- level authentication technique to secure the sensor data in cloud. This technique generates/authenticates the password at multiple levels to access cloud services. A strict authentication and authorization can be achieved through this technique. The proposed System is modeled using Petri net. Detailed analysis with respect to authentication scheme may be carried out. Our future work will be carried out in adding multi-dimensional password generation method to this system. Figure 5: System modeling using Petri nets The client is authorized only when all the levels are successfully validated. Otherwise, the request is aborted. Using this model, detailed analysis with respect to authentication scheme may be carried out which is a topic of our future research. 6. ACKNOWLEDGMENTS Our sincere thanks to Prof. K N B Murthy, Principal and Prof. Shylaja S S, HOD, Department of Information Science and Engineering, PESIT, Bangalore, for their constant encouragement 7. REFERENCES [1]. Center Bo Wang, HongYu Xing The Application of Cloud Computing in Education Informatization, Modern Educational Tech... Computer Science and Service System (CSSS), 2011 International Conference on IEEE, 27-29 June 2011, 978-1-4244-9762-1, pp 2673 2676. [2]. NIST Definition http://www.au.af.mil/au/awc/awcgate/nist/cloud-defv15.doc [3] Cloud Computing services & comparisons http://www.thbs.com/pdfs/comparison%20of%20cloud %20computing%20services.pdf [4] A Framework of Sensor - Cloud Integration Opportunities and Challenges, Mohammad Mehedi Hassan, Biao Song, Eui-Nam Huh, Published in: Proceeding ICUIMC '09 Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication ACM New York, NY, USA 2009, ISBN: 978-1-60558-405-8. [5] Maumita Bandyopadhyay, Parama Bhaumik, Zone Based Ant Colony Routing in Mobile Ad-hoc Network, IEEE conference, 2010 [6] Zone based ant colony routing for MANET to improve the performance By Dr.H Sarojadevi, Bhuvaneshwari Patil. [7] Mesut G unes, Udo Sorges, Imed Bouazizi, ARA The Ant-Colony Based Routing Algorithm for MANETs, International Workshop on Ad Hoc Networking, Vancouver, British Columbia, Canada, August 18-21, 2002. [8] Rinku Sen., Exchanging of Information between Cloud Computing Server and Sensor Node for Effective Application Development, ISDMISC 2011 [9] Selcuk Okdem and Dervis Karaboga; Routing in Wireless Sensor Network using Ant Colony Optimisation using Routing Chip ; Sensors, vol. 9, pp. 909-921, 2009 20

[10] Petri Net Theory and the Modeling of Systems, James Lyle Peterson, publisher: prentice-hall [11] Multi-level Authentication Technique for Accessing Cloud Services, Dinesha H A and Dr.V.K. Agrawal, IEEE, International Conference of Computing, Communications and Applications, PSNA College of engineering and technology, Dindigul, Tamilnadu. [12] Wireless Sensor-Cloud Integration Using Ant Colony Routing Algorithm, R Monica, Dinesha H A and Dr.V.K. Agrawal, International conference on Cloud Computing and Service Engineering CLUSE 2012, R.R College of Engineering, Bangalore. 21