User Authentication using Profiling in Mobile Cloud Computing

被引:8
|
作者
Jeong, Hoon [1 ]
Choi, Euiin [1 ]
机构
[1] Hannam Univ, Dept Comp Engn, Taejon, South Korea
关键词
Mobile Cloud Computing; Profiling; Security; Access Control; User Authentication;
D O I
10.1016/j.aasri.2012.09.044
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
As Cloud Computing has been spreading widely, users and service providers enables to use resource or service cheaply and easily without owning all the resource needed. However, cloud computing, virtualization technology, large distributed processing technologies, service availability, high-traffic processing will occur due to various problems. In recent years, among many of these problems in application security, access control, authentication, and password and a lot of it has been studied. User authentication in a mobile environment, especially the more important to them and high level of security certification is required. In this paper, in a mobile environment for high level security authentication using profiling techniques for access control and user authentication is proposed. (C) 2012 Published by Elsevier B.V. Selection and/or peer review under responsibility of American Applied Science Research Institute
引用
收藏
页码:262 / 267
页数:6
相关论文
共 50 条
  • [31] UAA: User Authentication Agent for Managing User Identities in Cloud Computing Environments
    Moghaddam, Faraz Fatemi
    Khanezaei, Nasrin
    Manavi, Sina
    Eslami, Mohammad
    Samar, Alireza
    [J]. 2014 IEEE 5TH CONTROL AND SYSTEM GRADUATE RESEARCH COLLOQUIUM (ICSGRC), 2014, : 208 - 212
  • [32] Security Implementation in cloud computing Using User Behaviour Profiling and Decoy Technology
    Reena, K. M.
    Yadav, Sunil Kumar
    Bajaj, Nikhil Kumar
    Singh, Vinay
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2017, : 471 - 474
  • [33] Using Mobile Devices for User Authentication
    Lach, Jacek
    [J]. COMPUTER NETWORKS, 2010, 79 : 263 - 268
  • [34] An ID-Based User Authentication Scheme for Cloud Computing
    Yang, Jen-Ho
    Lin, Pei-Yu
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 98 - 101
  • [35] ID-Based User Authentication Scheme for Cloud Computing
    Ping-Liang Chen
    Jen-Ho Yang
    Ching-I Lin
    [J]. Journal of Electronic Science and Technology, 2013, (02) : 221 - 224
  • [36] A Scalable and Efficient User Authentication Scheme for Cloud Computing Environments
    Moghaddam, Faraz Fatemi
    Moghaddam, Shiva Gerayeli
    Rouzbeh, Sohrab
    Araghi, Sagheb Kohpayeh
    Alibeigi, Nima Morad
    Varnosfaderani, Shirin Dabbaghi
    [J]. 2014 IEEE REGION 10 SYMPOSIUM, 2014, : 508 - 513
  • [37] Research on model of user behavior habit authentication in cloud computing
    [J]. Guo, F. (313919864@qq.com), 1600, Huazhong University of Science and Technology (41):
  • [38] A User Authentication Scheme Based on Trusted Platform for Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    [J]. SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
  • [39] ID-Based User Authentication Scheme for Cloud Computing
    PingLiang Chen
    JenHo Yang
    ChingI Lin
    [J]. JournalofElectronicScienceandTechnology, 2013, 11 (02) - 224
  • [40] UCAP: a PCL secure user authentication protocol in cloud computing
    Li, Xuefeng
    Zhang, Junwei
    Ma, Jianfeng
    [J]. Tongxin Xuebao/Journal on Communications, 2018, 39 (08): : 94 - 105