Secure User Authentication in Cloud Computing

被引:0
|
作者
Javaid, Zeeshan [1 ]
Ijaz, Imran [1 ]
机构
[1] Shaheed Zulfikar Ali Bhutto Inst Sci & Technol, Islamabad, Pakistan
关键词
Cloud Computing; Secure User Authentication; Credentials Hiding; VPN Cloud Tunneling;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud the industrial blockbuster of the era providing a list of benefits but suffering many problems with the rapid increase of clients, using different policies. With the passage of time many question arises on the security and performance of cloud, many issues originate because weak authentication process of the cloud servers and credentials openly travel in public internet which causes the breech in authentication process. Many new authentication schemes made and vary time to time to overcome the loop holes. This work suggests the model for hiding the authentication credentials travel on public internet.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] ADVANCED SECURE USER AUTHENTICATION FRAMEWORK FOR CLOUD COMPUTING
    Jiang, Rui
    [J]. INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2013, 6 (04): : 1700 - 1724
  • [2] Secure User Authentication in Cloud Computing Management Interfaces
    Soares, Liliana F. B.
    Fernandes, Diogo A. B.
    Freire, Mario M.
    Inacio, Pedro R. M.
    [J]. 2013 IEEE 32ND INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2013,
  • [3] A Secure User Authentication Protocol Based on ECC for Cloud Computing Environment
    Diksha Rangwani
    Hari Om
    [J]. Arabian Journal for Science and Engineering, 2021, 46 : 3865 - 3888
  • [4] A Secure User Authentication Protocol Based on ECC for Cloud Computing Environment
    Rangwani, Diksha
    Om, Hari
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2021, 46 (04) : 3865 - 3888
  • [5] An Enhanced Secure Authentication Scheme with User Anonymity in Mobile Cloud Computing
    Madhusudhan, R.
    Suvidha, K. S.
    [J]. 2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 17 - 22
  • [6] User Authentication in Cloud Computing
    Chang, Hyokyung
    Choi, Euiin
    [J]. UBIQUITOUS COMPUTING AND MULTIMEDIA APPLICATIONS, PT II, 2011, 151 : 338 - 342
  • [7] A provable and secure mobile user authentication scheme for mobile cloud computing services
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Shafiq, Muhammad
    Usman, Muhammad
    Asif, Muhammad
    Ghani, Anwar
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (14)
  • [8] Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment
    Lee, Hakjun
    Kang, Dongwoo
    Lee, Youngsook
    Won, Dongho
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [9] An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Chen, Hang
    Shen, Wei
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019,
  • [10] An Improvement of User Authentication Framework for Cloud Computing
    Mun, Jongho
    Kim, Jiye
    Won, Dongho
    [J]. JOURNAL OF COMPUTERS, 2016, 11 (06) : 446 - 454