Security as a Service by Verification using Information System (Info-Sys) in Cloud Network
Debabrata Sarddar1, Sougata Chakraborty2
1Debabrata Sarddar*, Assistant Professor, Department of Computer Science and Engineering, University of Kalyani, West Bengal, India.
2Sougata Chakraborty, Senior System Engineer, IBM India Private Limited in Kolkata, India.
Manuscript received on January 15, 2020. | Revised Manuscript received on January 22, 2020. | Manuscript published on February 10, 2020. | PP: 2253-2258 | Volume-9 Issue-4, February 2020. | Retrieval Number: D1769029420/2020©BEIESP | DOI: 10.35940/ijitee.D1769.029420
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Security in Cloud Network is essential and data security is required when data is transmitted from the sender device to receiver end and vice versa. Sometimes, the eavesdroppers might steal sensitive data which is dangerous for the users of the cloud network. The goal of the paper is to propose a newer dimension to Cloud Computing – ‘Security as a Service by verification using Information System in Cloud Network’ in which an authentication procedure is used from the user side to ensure the privacy of the network. AES algorithm is used to encrypt the Unique Identification Number (UID) provided by the user to hide from the eavesdroppers and decrypt the same at the receiver end. In this algorithm, the same key is used for encryption and decryption process. Therefore, the sender and the receiver must know and use the same secret key. We have introduced an Information System that keeps track of all users and helps during the verification. Decryption of the encrypted UID will also be done in this system. It also helps to manage session of all users who have logged into the system and tries to access the information with the UID. If the user shares one’s UID with other personnel and if it causes any problem of insecurity in organizational network, then it will also be caught by the Information System. This helps to protect the cloud network from the trespassers and increases security of the network.
Keywords: AES, Data Security, Information System, Security as a Service by Verification, Network Security, Unique Identification Number.
Scope of the Article: Security Technology and Information Assurance