Secure User Authentication in Cloud Computing

被引:0
|
作者
Javaid, Zeeshan [1 ]
Ijaz, Imran [1 ]
机构
[1] Shaheed Zulfikar Ali Bhutto Inst Sci & Technol, Islamabad, Pakistan
关键词
Cloud Computing; Secure User Authentication; Credentials Hiding; VPN Cloud Tunneling;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud the industrial blockbuster of the era providing a list of benefits but suffering many problems with the rapid increase of clients, using different policies. With the passage of time many question arises on the security and performance of cloud, many issues originate because weak authentication process of the cloud servers and credentials openly travel in public internet which causes the breech in authentication process. Many new authentication schemes made and vary time to time to overcome the loop holes. This work suggests the model for hiding the authentication credentials travel on public internet.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Research on model of user behavior habit authentication in cloud computing
    [J]. Guo, F. (313919864@qq.com), 1600, Huazhong University of Science and Technology (41):
  • [32] A User Authentication Scheme Based on Trusted Platform for Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    [J]. SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
  • [33] ID-Based User Authentication Scheme for Cloud Computing
    PingLiang Chen
    JenHo Yang
    ChingI Lin
    [J]. JournalofElectronicScienceandTechnology, 2013, 11 (02) - 224
  • [34] Exploiting Group Signature to Implement User Authentication in Cloud Computing
    Ji, Sai
    Liu, Dengzhi
    Shen, Jian
    [J]. ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 323 - 331
  • [35] A secure framework for enhancing user authentication in cloud environment using Biometrics
    Kathrine, G. Jaspher Willsie
    [J]. PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICSPC'17), 2017, : 283 - 287
  • [36] User-Friendly and Secure Architecture (UFSA) for Authentication of Cloud Services
    Fathi, Reza
    Salehi, Mohsen Amini
    Leiss, Ernst L.
    [J]. 2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2015, : 516 - 523
  • [37] A Secure IoT-Based Authentication System in Cloud Computing Environment
    Wu, Hsiao-Ling
    Chang, Chin-Chen
    Zheng, Yao-Zhu
    Chen, Long-Sheng
    Chen, Chih-Cheng
    [J]. SENSORS, 2020, 20 (19) : 1 - 14
  • [38] Secure Authentication for Data Protection in Cloud Computing using Color Schemes
    Potey, Manish M.
    Dhote, C. A.
    Sharma, Deepak H.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 424 - 427
  • [39] Lightweight Secure Authentication and Key Distribution Scheme for Vehicular Cloud Computing
    Goumidi, Hadjer
    Harous, Saad
    Aliouat, Zibouda
    Gueroui, Abdelhak Mourad
    [J]. SYMMETRY-BASEL, 2021, 13 (03):
  • [40] Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing
    Liu, Yao
    Zhou, Tanping
    Yue, Zelun
    Liu, Wenchao
    Han, Yiliang
    Li, Qi
    Yang, Xiaoyuan
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 564 - 578