Secure User Authentication in Cloud Computing

被引:0
作者
Javaid, Zeeshan [1 ]
Ijaz, Imran [1 ]
机构
[1] Shaheed Zulfikar Ali Bhutto Inst Sci & Technol, Islamabad, Pakistan
来源
PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013) | 2013年
关键词
Cloud Computing; Secure User Authentication; Credentials Hiding; VPN Cloud Tunneling;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud the industrial blockbuster of the era providing a list of benefits but suffering many problems with the rapid increase of clients, using different policies. With the passage of time many question arises on the security and performance of cloud, many issues originate because weak authentication process of the cloud servers and credentials openly travel in public internet which causes the breech in authentication process. Many new authentication schemes made and vary time to time to overcome the loop holes. This work suggests the model for hiding the authentication credentials travel on public internet.
引用
收藏
页数:5
相关论文
共 11 条
  • [1] Chen Tien-Ho, 2011, MULT UB ENG MUE 2011
  • [2] Choudhury A. J., 2011, SERV COMP C APSCC 20
  • [3] Ijaz Imran, 2012, INT J COMPUTER THEOR, V4, P505, DOI DOI 10.7763/IJCTE.2012.V4.520
  • [4] Revar A. G., 2011, PAR DISTR PROC S WOR
  • [5] Shanmugapriya S., 2012, J COMPUTER APPL, V5
  • [6] Shen Z., 2010, SIGN PROC SYST ICSPS
  • [7] Yang J., 2010, COMP INT SOFTW ENG C
  • [8] Yang J. W., 2011, INF SCI SERV SCI NIS
  • [9] Yassin A. A., 2012, PAR DISTR PROC S WOR
  • [10] Zhang Z., 2012, IND CONTR EL ENG ICI