Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2011, 2011 IEEE Asia-Pacific Services Computing Conference
…
6 pages
1 file
Cloud computing is combination of various computing entities, globally separated, but electronically connected. As the geography of computation is moving towards corporate server rooms, it bring more issues including security, such as virtualization security, distributed computing, application security, identity management, access control and authentication. However, strong user authentication is the paramount requirement for cloud computing that restrict illegal access of cloud server. In this regard, this paper proposes a strong user authentication framework for cloud computing, where user legitimacy is strongly verified before enter into the cloud. The proposed framework provides identity management, mutual authentication, session key establishment between the users and the cloud server. A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed framework for cloud computing and achieves efficiency.
Handbook of Research on Threat Detection and Countermeasures in Network Security, 2015
Cloud computing provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructure. These features make cloud computing more attractive to users and intruders. It needs more and complex security measures to protect user privacy and data centers. The main concern in this chapter is security, privacy and trust. This chapter will give a discussion and a suggestion for using cloud computing to preserve security and privacy. The malicious hacker and other threats are considering the major cause of leaking security of the personal cloud due to centralized location and remote accesses to the cloud. According to attacks, a centralized location can be easier target rather than several goals and remote access is insecure technologies which offer a boundary of options for attackers to infiltrate enterprises. The biggest concern is attackers that will use the remote connection as a jumping point to get deeper into an organization.
2021
Cloud computing is the fastest emergent internet centered technology for sharing computer resources on an as-needed base. In the cloud, security is really important. We propose a mutual authentication mechanism for cloud users and the cloud. In a cloud context, the framework also manages session keys. The mutual authentication process in this approach is split into three phases: server initialization, registration and authentication. The framework's security has been thoroughly examined in order to confirm its effectiveness. The proposed system is also immune to a variety of cloud computing assaults.
International Journal of Engineering Sciences & Research Technology, 2014
Cloud computing is a powerful tool for computation ability. This provides various diverse services and platforms for develop and manage user data in a remote storage. In this context, cloud also provides the ability to share and transfer large amounts of data in an efficient manner. In this paper, we have proposed new security architecture for cloud computing system. This ensures secure authentication system and hiding information from others. In this a diverse light weight AES algorithm based cryptographic solution is proposed for optimizing security. This model also includes one time password system for user authentication process.
Cloud computing is an emerging technology that is still unclear to many security problems and user authentication, access control, and ensuring the security of stored data in cloud servers are the most challenging issues in cloud-based environment. Accordingly, this paper offers an efficient and scalable user authentication scheme for cloud computing environment. It the suggested model, various tools and techniques have been introduced and used by using the concept of agent. Therefore, a client-based user authentication agent has been introduced to confirm identity of the user in client-side. Furthermore, a cloud-based software-as-a-service application has been used to confirm the process of authentication for unregistered devices. Moreover, there are two separate servers for storing authentication and cryptography resources from main servers to decrease the dependency of user authentication and encryption processes from main server. Cryptography agent was also introduced to encrypt resources before storing on cloud servers. In overall, the theoretical analysis of the suggested scheme shows that, designing this user authentication and access control model will enhance the reliability and rate of trust in cloud computing environments as an emerging and powerful technology in various industries.
2014
— Cloud Computing is going to be a big change of this decade; it has drastically altered everyone’s perception of infrastructure architecture, software delivery and development model, from a security perspective a number of unchartered risk and challenges have been introduced from this relocation to the Clouds, deteriorating much of the effectiveness of traditional protection mechanisms. An organization should establish a cross-functional team to align cloud computing security governance and architecture. The proposed model namely Client-Server-Cloud-Computing (CS2C) restricts the Man-In-The-Middle and will not vitiate the Central Cloud System from the organization level within
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019
Cloud computing is a way to increase the capacity or add capabilities dynamically without any upfront investments. Despite the growth achieved from the cloud computing, security is still questionable which impacts the cloud model adoption. Aside of having network and application securities being adopted, there must be a security that authenticate the user when accessing the cloud services that is bound to the rules between the cloud computing provider and the client side. The existing system provides authentication based on keys Encryption algorithms either symmetric key-based or asymmetric are key-based. Both encryption approaches have a major problem related to encryption key management i.e. how to securely generate, store, access and exchange secrete keys. In this paper, an optimized infrastructure for secure authentication and authorization in Cloud Environment using SSO (Single Sign-On) is proposed. SSO is a process of authenticating once and gain access of multiple resources that aims at reducing number of login and password in heterogeneous environment and to gain balance in Security, Efficiency and Usability. Also an authentication model for cloud computing based on the Kerberos protocol to provide single sign-on and to prevent against DDOS attacks is also presented in this paper.
2018
Cloud computing is overpowering the means by which data storage, transmission and execution are altering. But while exploiting services of the cloud, there are enormous security concerns. Among this authentication of the cloud user is the greatest security roadblock for cloud computing. Authentication is an incredible part of data security that can be used to prevent unauthorized users to penetrate into the cloud environment. There are many types of authentication schemes available for cloud environment. Several research works have been done on these schemes to formulate new and enhanced authentication techniques that provide greater security for the data stored on the cloud. In this paper several such authentication techniques have been studied and evaluated. A comparative analysis has been done to figure out the contributions of these techniques towards cloud security and privacy. Besides this the shortcomings of these existing techniques have also been enlisted so that they can b...
International Conference on Aerospace Sciences and Aviation Technology
Cloud computing provides innumerable benefits to its customers but failing to solve information security concerns. Cloud customers and providers need to guard against data loss and theft. Encryption of personal and enterprise data is strongly recommended. Strong encryption with key management is one of the core mechanisms that Cloud Computing systems should use to protect data, so key management is an important technology that can help secure applications and data in the cloud. In this paper, a formal analysis of a user authentication protocol for cloud computing is presented. Analysis show that the protocol is vulnerable to replay and Man-in-the middle attacks. To overcome these attacks, a modified authentication protocol for the cloud computing environment is proposed.
International Conference on Sustainable Computing in Science, Technology & Management (SUSCOM-2019), 2019
Cloud Computing is a service which is rapidly increasing its growth in IT industry in recent years. The privacy and security is main challenging issue for the cloud users as well providers. The main security issues in Cloud computing are Virtualization Security, Access Control, Authentication, Application Security, Availability of Services etc. Most important issue raised in this era of cloud is Authentication, in which the identity of a user requesting for services are checked. Hence, this paper would like to discuss the methods of user Authentication and Challenges faced in this technique.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Cybernetics Approaches in Intelligent Systems, 2017
7 th International Conference on Computer Science and Information Technology(SCCSIT’7), Khartoum, Sudan, 2020
International Journal of Computing and Network Technology, 2017
IAEME PUBLICATION, 2018
Journal of emerging technologies and innovative research, 2018
International Journal of Computer Applications, 2013
Int'l J. of Communications, Network and System Sciences, 2011
International Journal of Engineering Research and, 2015
Security and Communication Networks, 2022
Security and Communication Networks, 2016