• DocumentCode
    3767255
  • Title

    Analyzing configurations of authentication access points in cloud using attack graph

  • Author

    Sabout Nagaraju;Latha Parthiban

  • Author_Institution
    Department of Computer Science, Pondicherry University Community College, Lawspet, Pondicherry-605 008, India
  • fYear
    2015
  • Firstpage
    72
  • Lastpage
    76
  • Abstract
    Many real world applications and abstract concepts are exhibiting relationships and connectivity with the graph theory. Graph theory is very intuitive and its ubiquity makes it very natural. Various emerging information and communication technologies combining graph theory concepts for assessing and validating today´s security concerns in an easy way. In this article, we proposed graph theoretical models for analyzing application-level data security configurations in the cloud computing. One of the rapidly growing internet based technology is the cloud computing which has more complex structure with the interconnection of massive computing and storage resources, services, applications and stakeholders devices. One of the critical area of the cloud computing is to assess the security configurations between cloud applications and end-users. Because sensitive data is shared more than ever, through cloud services and via remote access as more and more employees use their various types of devices for work. In our proposed work we focused on enabling and assessing the multi-factor authentication policies for cloud applications. We used configuration and attack graphs to analyze the data protection using multi-factor authentication polices. Our approach helps to the cloud administration and stakeholders to understand and measure the today´s feasible cloud security concerns effectively.
  • Keywords
    "Cloud computing","Authentication","Ports (Computers)","Protocols","Servers","Graph theory"
  • Publisher
    ieee
  • Conference_Titel
    Computer Graphics, Vision and Information Security (CGVIS), 2015 IEEE International Conference on
  • Type

    conf

  • DOI
    10.1109/CGVIS.2015.7449896
  • Filename
    7449896