PlumX Metrics
Embed PlumX Metrics

Slide-block: End-to-end amplified security to improve DevOps resilience through pattern-based authentication

Heliyon, ISSN: 2405-8440, Vol: 10, Issue: 4, Page: e26312
2024
  • 0
    Citations
  • 0
    Usage
  • 18
    Captures
  • 1
    Mentions
  • 0
    Social Media
Metric Options:   Counts1 Year3 Year

Metrics Details

  • Captures
    18
  • Mentions
    1
    • News Mentions
      1
      • News
        1

Most Recent News

Research from VIT Bhopal University Yields New Data on Science and Technology (Slide-block: End-to-end amplified security to improve DevOps resilience through pattern-based authentication)

2024 MAR 11 (NewsRx) -- By a News Reporter-Staff News Editor at NewsRx Science Daily -- Current study results on science and technology have been

Article Description

DevOps represents the fusion of cultural philosophies, tools, and practices that rapidly enhance an organization's capacity to deploy services and applications. Cloud-based tools, a subset of DevOps services, facilitate collaboration between development and operations teams within an organization. However, persistent challenges such as inadequate security management, substantial leakage of sensitive data, and system/service unavailability pose significant threats to sustainability. We propose an end-to-end enhanced security framework to fortify DevOps resilience by implementing authentication and vulnerability management through the Slide-Block methodology. Our approach comprises four sequential processes: pattern-based authentication, tri-level access control, privacy-focused data storage, and vulnerability management and correction. Initially, we establish candidate legitimacy through pattern-based authentication using the Magnificent Chacha-Poly 1305 algorithm. Subsequently, we devise effective access policies using the Enhanced Deep Deterministic Policy Gradient (EDDPG) algorithm, employing tri-level access control based on trust value, attributes, and roles for optimal user and developer selection via the African Vulture Optimization Algorithm (AVOA). Moreover, we encrypt data in transit and at rest using Mcha-Poly 1305, considering sensitivity, and store it in a blockchain to enhance data privacy. Our approach incorporates a sliding window blockchain for secure data transmission and storage. Finally, we identify and address attack and application-based issues using the Tweak Naive Bayes (Tweak-NB) algorithm and Intruder Vulnerability Scanner (IVS). Our Slide-Block framework demonstrates superior performance in detection rate, authentication time, packet loss, security strengthening, communication overhead, and latency compared to existing models.

Provide Feedback

Have ideas for a new metric? Would you like to see something else here?Let us know