Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Utilizing a Lightweight PKI Mechanism to Guarantee a Secure Service in a Cloud Environment

Version 1 : Received: 20 February 2018 / Approved: 20 February 2018 / Online: 20 February 2018 (16:06:02 CET)

How to cite: Park, S.; Kim, H.; Park, J.; Ryou, J. Utilizing a Lightweight PKI Mechanism to Guarantee a Secure Service in a Cloud Environment. Preprints 2018, 2018020132. https://doi.org/10.20944/preprints201802.0132.v1 Park, S.; Kim, H.; Park, J.; Ryou, J. Utilizing a Lightweight PKI Mechanism to Guarantee a Secure Service in a Cloud Environment. Preprints 2018, 2018020132. https://doi.org/10.20944/preprints201802.0132.v1

Abstract

Recently, cloud technology has become popular for smart societies. The Cloud technology has made dynamical network changes by enabling the construction of a logical network without building a physical network. Despite recent research on the cloud, it is necessary to study security functions for the identification of fake VNFs and the encryption of communication between entities. In this paper, we proposed an LW_PKI mechanism that detects a fake VNF and guarantees data security through mutual authentication between VNFs. To evaluate the LW_PKI, we built a MANO environment to test the performance of authentication and key generation for data security. In addition, we applied the artificial intelligence algorithm to detect abnormal behavior by using real attack data in the MANO environment. The LW_PKI guaranteed the reliability of a smart service by enhancing the security of the cloud environment.

Keywords

energy-efficient communications, green and cloud computing, Network Function Virtualization, Lightweight PKI, Authentication, DDOS, Artificial Intelligence

Subject

Computer Science and Mathematics, Information Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.