User Authentication in Cloud Computing

被引:0
|
作者
Chang, Hyokyung [1 ]
Choi, Euiin [1 ]
机构
[1] Hannam Univ, Dept Comp Engn, Taejon, South Korea
来源
UBIQUITOUS COMPUTING AND MULTIMEDIA APPLICATIONS, PT II | 2011年 / 151卷
关键词
Cloud Computing; Security; Access Control; User Authentication;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As Cloud Computing has been spreading widely, users and service providers enables to use resource or service cheaply and easily without owning all the resource needed. However, Cloud Computing has some security issues such as virtualization technology security, massive distributed processing technology, service availability, massive traffic handling, application security, access control, and authentication and password. User authentication among them requires a high-quranteed security. Hence, this paper would like to discuss technologies of access contol and user authentication briefly and look at the problems inside.
引用
收藏
页码:338 / 342
页数:5
相关论文
共 50 条
  • [21] An Enhanced Secure Authentication Scheme with User Anonymity in Mobile Cloud Computing
    Madhusudhan, R.
    Suvidha, K. S.
    2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 17 - 22
  • [22] Keystroke dynamics-based user authentication service for cloud computing
    Abo-alian, Alshaimaa
    Badr, Nagwa L.
    Tolba, M. F.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (09): : 2567 - 2585
  • [23] Smart Card Based Remote User Authentication Scheme for Cloud Computing
    Madhusudhan, R.
    Hegde, Manjunath
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 905 - 910
  • [24] A provable and secure mobile user authentication scheme for mobile cloud computing services
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Shafiq, Muhammad
    Usman, Muhammad
    Asif, Muhammad
    Ghani, Anwar
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (14)
  • [25] Security Enhanced Anonymous Remote User Authentication and Key Agreement for Cloud Computing
    Dong, Zheming
    Zhang, Lei
    Li, Jiangtao
    2014 IEEE 17th International Conference on Computational Science and Engineering (CSE), 2014, : 1746 - 1751
  • [26] Authentication and Encryption in Cloud Computing
    Singh, Jatinder Paul
    Mamta
    Kumar, Sunil
    2015 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM), 2015, : 216 - 219
  • [27] Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment
    Lee, Hakjun
    Kang, Dongwoo
    Lee, Youngsook
    Won, Dongho
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [28] Deterministic Hash and Linear Congruential BlowFish Extreme Learning for User Authentication in Cloud Computing
    Radha S.
    Jeyalaksshmi S.
    SN Computer Science, 4 (6)
  • [29] An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Chen, Hang
    Shen, Wei
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [30] An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment
    Wang, Chenyu
    Ding, Ke
    Li, Bin
    Zhao, Yiming
    Xu, Guoai
    Guo, Yanhui
    Wang, Ping
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,