Secure User Authentication in Cloud Computing

被引:0
|
作者
Javaid, Zeeshan [1 ]
Ijaz, Imran [1 ]
机构
[1] Shaheed Zulfikar Ali Bhutto Inst Sci & Technol, Islamabad, Pakistan
关键词
Cloud Computing; Secure User Authentication; Credentials Hiding; VPN Cloud Tunneling;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud the industrial blockbuster of the era providing a list of benefits but suffering many problems with the rapid increase of clients, using different policies. With the passage of time many question arises on the security and performance of cloud, many issues originate because weak authentication process of the cloud servers and credentials openly travel in public internet which causes the breech in authentication process. Many new authentication schemes made and vary time to time to overcome the loop holes. This work suggests the model for hiding the authentication credentials travel on public internet.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Lightweight deep learning model to secure authentication in Mobile Cloud Computing
    Zeroual, Abdelhakim
    Amroune, Mohamed
    Derdour, Makhlouf
    Bentahar, Atef
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (09) : 6938 - 6948
  • [42] A Secure Multi-Tier Authentication Scheme in Cloud Computing Environment
    Singh, Ashish
    Chatterjee, Kakali
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [43] DACSC: Secure Authentication Protocol Based on Dynamic Authentication Credentials and IntelSGX in Cloud Computing Environments
    Ni, Lina
    Ni, Boguang
    Tang, Yuncan
    Zhang, Jinquan
    Journal of Network Intelligence, 2023, 8 (03): : 948 - 964
  • [44] Context-aware Platform for User Authentication in Cloud Database Computing
    Kim, Manjea
    Jeong, Hoon
    Choi, Euiin
    2012 INTERNATIONAL CONFERENCE ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT SCIENCE & ENGINEERING (FITMSE 2012), 2012, 14 : 170 - 176
  • [45] Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing
    Yang, Xu
    Huang, Xinyi
    Liu, Joseph K.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 190 - 195
  • [46] A User Authentication Scheme on Multi-Server Environments for Cloud Computing
    Yang, Jen-Ho
    Chang, Ya-Fen
    Huang, Chih-Cheng
    2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,
  • [47] Keystroke dynamics-based user authentication service for cloud computing
    Abo-alian, Alshaimaa
    Badr, Nagwa L.
    Tolba, M. F.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (09): : 2567 - 2585
  • [48] Smart Card Based Remote User Authentication Scheme for Cloud Computing
    Madhusudhan, R.
    Hegde, Manjunath
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 905 - 910
  • [49] The Authentication Game - Secure User Authentication by Gamification?
    Ebbers, Frank
    Brune, Philipp
    ADVANCED INFORMATION SYSTEMS ENGINEERING (CAISE 2016), 2016, 9694 : 101 - 115
  • [50] Secure store of user authentication tokens in multi-cloud storage system
    Sun, Jinjin
    Xu, Ming
    Feng, Shifang
    Li, Zhongwei
    Wang, Gang
    Liu, Xiaoguang
    Journal of Computational Information Systems, 2015, 11 (03): : 1013 - 1020