A simple user authentication scheme for grid computing

被引:0
|
作者
Department of Computer Science and Engineering, Shanghai Jiao Tong University, No.800, Dongchuan Rd., Minghang District, Shanghai, 200240, China [1 ]
机构
来源
Int. J. Netw. Secur. | 2008年 / 2卷 / 202-206期
关键词
Geometry; -; Cryptography; Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
The security issue has become an important concern of grid computing. To prevent the grid resources from being illegally visited, the strong mutual authentication is needed for user and server. In this paper, based on the elliptic curve cryptosystem, we would like to propose an efficient user authentication scheme for grid computing. The proposed scheme only requires a one-way hash func-tion and server private key, which makes it more simple.
引用
收藏
相关论文
共 50 条
  • [41] An authentication scheme for distributed computing environment
    Jan S.U.
    Qayum F.
    Jan, Saeed Ullah (saeedullah@uom.edu.pk), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (13): : 227 - 248
  • [42] Simple Authentication Process for Cloud User
    Munir, Kashif
    Palaniappan, Sellapan
    2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, : 1175 - 1181
  • [43] A Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Cloud Computing
    Wu, Fan
    Xu, Lili
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 189 - 200
  • [44] On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services
    Roy, Sandip
    Chatterjee, Santanu
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    IEEE ACCESS, 2017, 5 : 25808 - 25825
  • [45] Provably secure biometric-based user authentication and key agreement scheme in cloud computing
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4103 - 4119
  • [46] Efficient and secure source authentication scheme for multicast user authentication
    Jeong, Yoon-su
    Lee, Sang-hyuk
    Shin, Seung-soo
    JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2013, 20 (10) : 2741 - 2746
  • [47] Efficient and secure source authentication scheme for multicast user authentication
    JEONG Yoon-su
    LEE Sang-hyuk
    SHIN Seung-soo
    JournalofCentralSouthUniversity, 2013, 20 (10) : 2741 - 2746
  • [48] Efficient and secure source authentication scheme for multicast user authentication
    Yoon-su Jeong
    Sang-hyuk Lee
    Seung-soo Shin
    Journal of Central South University, 2013, 20 : 2741 - 2746
  • [49] Grid Authentication: A Memorability and User Sentiment Study
    Biocco, Paul
    Anwar, Mohd
    HCI FOR CYBERSECURITY, PRIVACY AND TRUST, 2019, 11594 : 3 - 18
  • [50] An Improvement of User Authentication Framework for Cloud Computing
    Mun, Jongho
    Kim, Jiye
    Won, Dongho
    JOURNAL OF COMPUTERS, 2016, 11 (06) : 446 - 454