Open Access iconOpen Access

ARTICLE

crossmark

Cloud Security Service for Identifying Unauthorized User Behaviour

D. Stalin David1, Mamoona Anam2, Chandraprabha Kaliappan3, S. Arun Mozhi Selvi4, Dilip Kumar Sharma5, Pankaj Dadheech6, Sudhakar Sengan7,*

1 Department of Computer Science and Engineering, IFET College of Engineering, Villupuram, 605108, Tamil Nadu, India
2 Department of Computer Sciences and Software Engineering, Faculty of Basic and Applied Sciences, International Islamic University, Islamabad, Pakistan
3 Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam, 638401, Tamil Nadu, India
4 Department of Computer Science Engineering, DMI St. John the Baptist University, Mangochi, Lilongwe, Malawi
5 Department of Mathematics, Jaypee University of Engineering and Technology, Guna, 473226, Madhya Pradesh, India
6 Department of Computer Science and Engineering, Swami Keshvanand Institute of Technology, Management and Gramothan (SKIT), Jaipur, 302017, Rajasthan, India
7 Department of Computer Science and Engineering, PSN College of Engineering and Technology, Tirunelveli, 627152, Tamil Nadu, India

* Corresponding Author: Sudhakar Sengan. Email: email

Computers, Materials & Continua 2022, 70(2), 2581-2600. https://doi.org/10.32604/cmc.2022.020213

Abstract

Recently, an innovative trend like cloud computing has progressed quickly in Information Technology. For a background of distributed networks, the extensive sprawl of internet resources on the Web and the increasing number of service providers helped cloud computing technologies grow into a substantial scaled Information Technology service model. The cloud computing environment extracts the execution details of services and systems from end-users and developers. Additionally, through the system’s virtualization accomplished using resource pooling, cloud computing resources become more accessible. The attempt to design and develop a solution that assures reliable and protected authentication and authorization service in such cloud environments is described in this paper. With the help of multi-agents, we attempt to represent Open-Identity (ID) design to find a solution that would offer trustworthy and secured authentication and authorization services to software services based on the cloud. This research aims to determine how authentication and authorization services were provided in an agreeable and preventive manner. Based on attack-oriented threat model security, the evaluation works. By considering security for both authentication and authorization systems, possible security threats are analyzed by the proposed security systems.

Keywords


Cite This Article

APA Style
David, D.S., Anam, M., Kaliappan, C., Selvi, S.A.M., Sharma, D.K. et al. (2022). Cloud security service for identifying unauthorized user behaviour. Computers, Materials & Continua, 70(2), 2581-2600. https://doi.org/10.32604/cmc.2022.020213
Vancouver Style
David DS, Anam M, Kaliappan C, Selvi SAM, Sharma DK, Dadheech P, et al. Cloud security service for identifying unauthorized user behaviour. Comput Mater Contin. 2022;70(2):2581-2600 https://doi.org/10.32604/cmc.2022.020213
IEEE Style
D.S. David et al., “Cloud Security Service for Identifying Unauthorized User Behaviour,” Comput. Mater. Contin., vol. 70, no. 2, pp. 2581-2600, 2022. https://doi.org/10.32604/cmc.2022.020213



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2792

    View

  • 1281

    Download

  • 0

    Like

Share Link