Secure User Authentication in Cloud Computing

被引:0
|
作者
Javaid, Zeeshan [1 ]
Ijaz, Imran [1 ]
机构
[1] Shaheed Zulfikar Ali Bhutto Inst Sci & Technol, Islamabad, Pakistan
关键词
Cloud Computing; Secure User Authentication; Credentials Hiding; VPN Cloud Tunneling;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud the industrial blockbuster of the era providing a list of benefits but suffering many problems with the rapid increase of clients, using different policies. With the passage of time many question arises on the security and performance of cloud, many issues originate because weak authentication process of the cloud servers and credentials openly travel in public internet which causes the breech in authentication process. Many new authentication schemes made and vary time to time to overcome the loop holes. This work suggests the model for hiding the authentication credentials travel on public internet.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] A lightweight anonymous authentication scheme for secure cloud computing services
    Hammami, Hamza
    Ben Yahia, Sadok
    Obaidat, Mohammad S.
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (02): : 1693 - 1713
  • [22] Implementation of Secure Authentication Scheme and Access Control in Cloud Computing
    Pawar, Prativesh
    Sheikh, Rashid
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [23] A Secure Two-Factor Authentication Framework in Cloud Computing
    Kaur, Sandeep
    Kaur, Gaganpreet
    Shabaz, Mohammad
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [24] A SECURE AUTHENTICATION SCHEME FOR MOBILE CLOUD COMPUTING AGAINST CCA
    Hossain, Md Jakir
    Xu, Chunxiang
    Li, Chuang
    2020 17TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2020, : 266 - 270
  • [25] A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Giri, Debasis
    Khan, Muhammad Khurram
    Kumar, Neeraj
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4650 - 4666
  • [26] UAA: User Authentication Agent for Managing User Identities in Cloud Computing Environments
    Moghaddam, Faraz Fatemi
    Khanezaei, Nasrin
    Manavi, Sina
    Eslami, Mohammad
    Samar, Alireza
    2014 IEEE 5TH CONTROL AND SYSTEM GRADUATE RESEARCH COLLOQUIUM (ICSGRC), 2014, : 208 - 212
  • [27] An ID-Based User Authentication Scheme for Cloud Computing
    Yang, Jen-Ho
    Lin, Pei-Yu
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 98 - 101
  • [28] ID-Based User Authentication Scheme for Cloud Computing
    Ping-Liang Chen
    Jen-Ho Yang
    Ching-I Lin
    Journal of Electronic Science and Technology, 2013, (02) : 221 - 224
  • [29] A Scalable and Efficient User Authentication Scheme for Cloud Computing Environments
    Moghaddam, Faraz Fatemi
    Moghaddam, Shiva Gerayeli
    Rouzbeh, Sohrab
    Araghi, Sagheb Kohpayeh
    Alibeigi, Nima Morad
    Varnosfaderani, Shirin Dabbaghi
    2014 IEEE REGION 10 SYMPOSIUM, 2014, : 508 - 513
  • [30] Research on model of user behavior habit authentication in cloud computing
    Guo, F. (313919864@qq.com), 1600, Huazhong University of Science and Technology (41):