Node Verification to Join the Cloud Environment Using Third Party Verification Server

Authors

  • Ashraf Hamdan Aljammal The Hashemite University
  • Hani Bani-Salameh
  • Ayoub Alsarhan
  • Mohammad Kharabsheh
  • Mamoon Obiedat

DOI:

https://doi.org/10.3991/ijim.v11i4.6501

Keywords:

Cloud computing, Cloud security, Network security, Node scanning.

Abstract


Currently, cloud computing is facing different types of threats whether from inside or outside its environment.  This may cause cloud to be crashed or at least unable to provide services to the requests made by clients. In this paper, a new technique is proposed to make sure that the new node which asks to join the cloud is not composing a threat on the cloud environment. Our new technique checks the node before it will be guaranteed to join the cloud whether it runs malwares or software that could be used to launch an attack. In this way the cloud will allow only the clean node to join it, eliminating the risk of some types of threats that could be caused by infected nodes.

Author Biography

Ashraf Hamdan Aljammal, The Hashemite University

Ashraf Aljammal received the BSc degree in computer science from Albalqa' Applied University, Al-Salt, Jordan, in 2006, the master's degree from Science University of Malaysia, USM, Malaysia, in 2007, and the PhD degree from Science University of Malaysia, USM, Malaysian, in 2011. He is currently an assistant professor in the department of Computer Science of the Hashemite University, Zarqa, Jordan, since 2012. His research interests include network monitoring, network security, cloud computing Security

Downloads

Published

2017-05-22

How to Cite

Aljammal, A. H., Bani-Salameh, H., Alsarhan, A., Kharabsheh, M., & Obiedat, M. (2017). Node Verification to Join the Cloud Environment Using Third Party Verification Server. International Journal of Interactive Mobile Technologies (iJIM), 11(4), pp. 55–65. https://doi.org/10.3991/ijim.v11i4.6501

Issue

Section

Papers