Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Ant Colony Based Authentication System for Cloud Computing

M. Hemanth Chakravarthy and E. Kannan
Department of Computer Science and Engineering, Vel Tech University, Chennai-62, Tamil Nadu, India
Research Journal of Applied Sciences, Engineering and Technology   2015  2:144-149
http://dx.doi.org/10.19026/rjaset.11.1700  |  © The Author(s) 2015
Received: March ‎19, ‎2015  |  Accepted: April ‎13, ‎2015  |  Published: September 15, 2015

Abstract

In today’s world key management for secured cloud is very essential. Dealing huge data on computing is one of the major requirement of the modern computing. This study proposes ant colony based authentication mechanism for cloud system. Ant Colony Optimization (ACO) is a swarm intelligence technique. ACO provides optimality in many discrete mathematical problems in almost all engineering problem domains. ACO follows the imitation of behavioral aspects of ant. Recent researchers highly following swarm intelligence algorithms for critical and real time problems. Secured cloud is an important research issue due to its variety of customers, devices used for access, variant parameters and metrics involved. The clouds are accessed by the modern hand held devices, so smaller sizes of security keys are much preferred for encryption algorithm. Further, few researchers improved the performance of RSA using Chinese Remainder Theorem. Even though, it is still a question for those approaching the clouds using their hand held systems in terms of processing time, memory and bandwidth.

Keywords:

Ant colony optimization, cloud computing, cryptography, key management, security,


References

  1. Almorsy, M., J. Grundy and A.S. Ibrahim, 2011. Collaboration-based cloud computing security management framework. Proceeding of the IEEE International Conference on Cloud Computing (CLOUD), pp: 364-371.
    CrossRef    
  2. Athavale, A., K. Singh and S. Sood, 2009. Design of a private credentials scheme based on elliptic curve cryptography. Proceeding of the 1st International Conference on Computational Intelligence, Communication Systems and Networks (CICSYN'09), pp: 332-335.
    CrossRef    
  3. Brohi, S.N., M.A. Bamiah, S. Chuprat and J.L.A. Manan, 2014. Design and implementation of a privacy preserved off-premises cloud storage. J. Comput. Sci., 10: 210-223.
    CrossRef    
  4. Kumar, S.K.S. and P. Balasubramanie, 2012. Dynamic scheduling for cloud reliability using transportation problem. J. Comput. Sci., 8: 1615-1626.
    CrossRef    
  5. Mehdi, N.A., A. Mamat, H. Ibrahim and S.K. Subramaniam, 2011. Impatient task mapping in elastic cloud using genetic algorithm. J. Comput. Sci., 7: 877-883.
    CrossRef    
  6. Ponnuramu, V. and L. Tamilselvan, 2012. Data integrity proof and secure computation in cloud computing. J. Comput. Sci., 8: 1987-1995.
    CrossRef    
  7. Qing-Hai, B., Z. Wen-Bo, J. Peng and L. Xu, 2012. Research on design principles of elliptic curve public key cryptography and its implementation. Proceeding of the International Conference on Computer Science and Service System (CSSS, 2012), pp: 1224-1227.
    CrossRef    
  8. Wang, E.D., N. Wu and X. Li, 2013. QoS-oriented monitoring model of cloud computing resources availability. Proceeding of the 5th International Conference on Computational and Information Sciences (ICCIS, 2013), pp: 1537-1540.
  9. William, S., 2005. Cryptography and Network Security: Principles and Practices. 4th Edn., Prentice Hall, Upper Saddle River, NJ.
    PMCid:PMC1464570    
  10. Wu, C.F. and L.P. Huang, 2011. Developing the environment of information technology education using cloud computing infrastructure. Am. J. Appl. Sci., 8: 864-871.
    CrossRef    
  11. Zehua, Z. and Z. Xuejie, 2009. Realization of open cloud computing federation based on mobile agent. Proceeding of the IEEE International Conference on Intelligent Computing and Intelligent Systems, 3: 642- 646.

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved