DocumentCode :
680300
Title :
Secure user authentication in cloud computing
Author :
Javaid, Zarrar ; Ijaz, Imran
Author_Institution :
Shaheed Zulfikar Ali Bhutto Inst. of Sci. & Technol., Islamabad, Pakistan
fYear :
2013
fDate :
14-15 Dec. 2013
Firstpage :
1
Lastpage :
5
Abstract :
Cloud the industrial blockbuster of the era providing a list of benefits but suffering many problems with the rapid increase of clients, using different policies. With the passage of time many question arises on the security and performance of cloud, many issues originate because weak authentication process of the cloud servers and credentials openly travel in public internet which causes the breech in authentication process. Many new authentication schemes made and vary time to time to overcome the loop holes. This work suggests the model for hiding the authentication credentials travel on public internet.
Keywords :
cloud computing; security of data; authentication credentials; authentication process; authentication schemes; cloud computing; cloud performance; cloud security; public Internet; user authentication security; Authentication; Cloud computing; Computational modeling; Servers; Time factors; Virtual private networks; Cloud Computing; Credentials Hiding; Secure User Authentication; VPN Cloud Tunneling;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information & Communication Technologies (ICICT), 2013 5th International Conference on
Conference_Location :
Karachi
Print_ISBN :
978-1-4799-2621-3
Type :
conf
DOI :
10.1109/ICICT.2013.6732775
Filename :
6732775
Link To Document :
بازگشت