Discuss Cloud security protocol and validation
I need someone with excellent understanding in security protocol validation.
(I need to add a validation simulation section)
I need to show concrete discussion showing validation and justification and verification, that I solved the problem and included a summary to be used to finish the task (file attached)
I have implemented two experiments (same model) for the multiparty authentication model and its five protocols, the first one using Elcipse and the second one using Opnet to continue , validate and justify my previous model(Eclipse) which is prove the correctness of the protocol is formally analysed and proven using the well-known BAN logic (theoretical and mathematical modelling of the approach). Also Using Analytic Assessment, we focus on the analytic assessment of the MPA protocols and the key management mechanisms for business sessions. A comprehensive empirical study is performed to evaluate the scalability and the runtime overhead of the authentication system. theoretical and mathematical modelling of the approach
In summary, I mean, after I implemented my first model and proved the correctness of the protocol and Using analytic assessment, we focus on the analytic assessment of the MPA protocols and the key management mechanisms. I have implemented the same model (the multiparty authentication model and its five protocols) using Opnet to validate and justify my previous model.
After you finish, Please comment response the below question from what you have done in validation section
1.Need a section on validating simulation results following the correctness of results. This validation process/section should compare results with literature already been discusses and cited in the literature review section.
2.What is the evidence that the results solved the problem and how can you validate these results? How do you know that the problem has been solved and what is the verification for this?