Credential Based Authentication Approach for Dynamic Group in Cloud Environment

被引:2
|
作者
Selvamani, K. [1 ]
Arya, Pradeep Kumar [1 ]
机构
[1] Anna Univ, Dept Comp Sci & Engn, Madras 600025, Tamil Nadu, India
来源
INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015) | 2015年 / 48卷
关键词
Cloud computing; Authentication; Credentials; ecosystem; AUTHORIZATION;
D O I
10.1016/j.procs.2015.04.166
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Solutions provided by Cloud computing not only includes the issues inherited from related technologies such as virtualization and distributed computing, but also new concerns associated to complexity of the cloud ecosystem composed by the cloud entities and their interactions. Authentication plays an important aspect in Cloud computing. This proposed system concentrates on authentication with reasonable time factor and reduce data traffic in the Cloud computing process. In addition, this system also identifies and analysis the credential management that focus on the cloud ecosystem for dynamic groups. Moreover a framework for credential classification that analyses the unifying concept and its related service is proposed and implemented. This proposed system proves to be more efficient when compare to other existing technology. (C) 2015 The Authors. Published by Elsevier B.V.
引用
收藏
页码:166 / 172
页数:7
相关论文
共 50 条
  • [21] Dynamic Reciprocal Authentication Protocol for Mobile Cloud Computing
    Ahmed, Abdulghani Ali
    Wendy, Kwan
    Kabir, Muhammad Nomani
    Sadiq, Ali Safaa
    IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 727 - 737
  • [22] Cloud-based RFID Authentication
    Xie, Wei
    Xie, Lei
    Zhang, Chen
    Zhang, Quan
    Tang, Chaojing
    2013 IEEE INTERNATIONAL CONFERENCE ON RFID (RFID), 2013, : 168 - 175
  • [23] A Dynamic Approach for Consistency Service in Cloud and Fog Environment
    Mostafa, Nour
    2020 FIFTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2020, : 28 - 33
  • [24] Blockchain-Based Credential Management for Anonymous Authentication in SAGVN
    Liu, Dongxiao
    Wu, Huaqing
    Huang, Cheng
    Ni, Jianbing
    Shen, Xuemin
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2022, 40 (10) : 3104 - 3116
  • [25] An Efficient Privacy Authentication Scheme Based on Cloud Models for Medical Environment
    Ying, Zhaoqin
    Chiou, Shin-Yan
    Liu, Junqiang
    PROCEEDINGS 2015 18TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2015), 2015, : 628 - 633
  • [26] Authentication in cloud-driven IoT-based big data environment: Survey and outlook
    Wazid, Mohammad
    Das, Ashok Kumar
    Hussain, Rasheed
    Succi, Giancarlo
    Rodrigues, Joel J. P. C.
    JOURNAL OF SYSTEMS ARCHITECTURE, 2019, 97 : 185 - 196
  • [27] A Secure IoT-Based Authentication System in Cloud Computing Environment
    Wu, Hsiao-Ling
    Chang, Chin-Chen
    Zheng, Yao-Zhu
    Chen, Long-Sheng
    Chen, Chih-Cheng
    SENSORS, 2020, 20 (19) : 1 - 14
  • [28] A Client-based User Authentication Scheme for the Cloud of Things Environment
    Katuk, Norliza
    Vergallo, Roberto
    Sugiharto, Tito
    Krisdiawan, Rio Andriyat
    JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2022, 22 (02): : 102 - 115
  • [29] RETRACTED ARTICLE: An identity authentication scheme based on cloud computing environment
    Manjun Zhang
    Zheng Ma
    Yan Zhang
    Yongbin Wang
    Multimedia Tools and Applications, 2018, 77 : 4283 - 4294
  • [30] Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment
    Ramachandran, A.
    Ramadevi, P.
    Alkhayyat, Ahmed
    Yousif, Yousif Kerrar
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 36 (02) : 2055 - 2070