Open Access
ARTICLE
Secure Information Access Strategy for a Virtual Data Centre
1 Department of Computer Science and Engineering, Government College of Engineering, Bodinayakkanur, Theni Dist, Tamilnadu, India
2 Professor, Department of Computer Science and Engineering, KPR Institute of Engineering and Technology, Coimbatore - 641 407, Tamilnadu, India
∗ Email: bsranjani@gmail.com
† Email: d.surendran@gmail.com
Computer Systems Science and Engineering 2020, 35(5), 357-366. https://doi.org/10.32604/csse.2020.35.357
Abstract
With the arrival of on-demand computing, data centre requirements are extensive, with fluid boundaries. Loaded Internet applications, service-oriented architectures, virtualization and security provisioning are the major operations of a data centre. Security is an absolute necessity of any network architecture, and the virtual IT data centre is no exception. At the boundary, security is focused on securing the terminals of the data centre from external threats and providing a secure gateway to the Internet. The paradigm shift towards a new computing environment makes communications more complicated for Infrastructure Providers (InP). This complexity includes the security of the data centre’s components to protect data from malicious attacks or from being compromised. Threats/attacks are inevitable if the data are generated from a public network, such as Wi-Fi in an Airport, Railway station and other public places. Since these places create enormous amounts of data from anonymous and naive users, it is essential to store the information in a data centre. In this article, we propose an efficient, secure, and privacy-preservation information access algorithm to access data centres in public wifi networks. This algorithm is based on the primitive root approach for sending and receiving credentials through the anonymous authentication of the users and ensuring protected data access from the data centre. Security and Performance Analysis and its evaluation prove that our approach is successful with respect to security, privacy preservation and computational complexity.Keywords
Cite This Article
Citations
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.