User Authentication in Cloud Computing

被引:0
|
作者
Chang, Hyokyung [1 ]
Choi, Euiin [1 ]
机构
[1] Hannam Univ, Dept Comp Engn, Taejon, South Korea
来源
UBIQUITOUS COMPUTING AND MULTIMEDIA APPLICATIONS, PT II | 2011年 / 151卷
关键词
Cloud Computing; Security; Access Control; User Authentication;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As Cloud Computing has been spreading widely, users and service providers enables to use resource or service cheaply and easily without owning all the resource needed. However, Cloud Computing has some security issues such as virtualization technology security, massive distributed processing technology, service availability, massive traffic handling, application security, access control, and authentication and password. User authentication among them requires a high-quranteed security. Hence, this paper would like to discuss technologies of access contol and user authentication briefly and look at the problems inside.
引用
收藏
页码:338 / 342
页数:5
相关论文
共 50 条
  • [41] Authentication in mobile cloud computing: A survey
    Alizadeh, Mojtaba
    Abolfazli, Saeid
    Zamani, Mazdak
    Baharun, Sabariah
    Sakurai, Kouichi
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 : 59 - 80
  • [42] Provisioning Authentication Technique in Cloud Computing
    Jeong, Hoon
    Do, Hana
    Choi, Euiin
    2013 FOURTH INTERNATIONAL CONFERENCE ON EDUCATION AND SPORTS EDUCATION (ESE 2013), PT I, 2013, 11 : 498 - 502
  • [43] A Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Cloud Computing
    Wu, Fan
    Xu, Lili
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 189 - 200
  • [44] On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services
    Roy, Sandip
    Chatterjee, Santanu
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    IEEE ACCESS, 2017, 5 : 25808 - 25825
  • [45] Provably secure biometric-based user authentication and key agreement scheme in cloud computing
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4103 - 4119
  • [46] A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture
    Nafi, Kawser Wazed
    Kar, Tonny Shekha
    Hoque, Sayed Anisul
    Hashem, M. M. A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (10) : 181 - 186
  • [47] A simple user authentication scheme for grid computing
    Department of Computer Science and Engineering, Shanghai Jiao Tong University, No.800, Dongchuan Rd., Minghang District, Shanghai, 200240, China
    Int. J. Netw. Secur., 2008, 2 (202-206):
  • [48] Implementation of User Authentication as a Service for Cloud Network
    Shah, Masood
    Shah, Abdul Sala
    Ijaz, Imran
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (10): : 197 - 209
  • [49] Research on authentication of user information in cloud manufacturing
    Xie X.
    Zhou X.
    Liu Y.
    Recent Patents on Engineering, 2019, 13 (04) : 410 - 415
  • [50] Mobile user authentication system in cloud environment
    Yeh, Her-Tyan
    Chen, Bing-Chang
    Wu, Yi-Cong
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (09) : 1161 - 1168