DocumentCode
190097
Title
A scalable and efficient user authentication scheme for cloud computing environments
Author
Fatemi Moghaddam, Faraz ; Moghaddam, Shiva Gerayeli ; Rouzbeh, Sohrab ; Araghi, Sagheb Kohpayeh ; Alibeigi, Nima Morad ; Varnosfaderani, Shirin Dabbaghi
Author_Institution
Fac. of Comput. Sci. & IT, U.P.M. Univ., Serdang, Malaysia
fYear
2014
fDate
14-16 April 2014
Firstpage
508
Lastpage
513
Abstract
Cloud computing is an emerging technology that is still unclear to many security problems and user authentication, access control, and ensuring the security of stored data in cloud servers are the most challenging issues in cloud-based environment. Accordingly, this paper offers an efficient and scalable user authentication scheme for cloud computing environment. It the suggested model, various tools and techniques have been introduced and used by using the concept of agent. Therefore, a client-based user authentication agent has been introduced to confirm identity of the user in client-side. Furthermore, a cloud-based software-as-a-service application has been used to confirm the process of authentication for unregistered devices. Moreover, there are two separate servers for storing authentication and cryptography resources from main servers to decrease the dependency of user authentication and encryption processes from main server. Cryptography agent was also introduced to encrypt resources before storing on cloud servers. In overall, the theoretical analysis of the suggested scheme shows that, designing this user authentication and access control model will enhance the reliability and rate of trust in cloud computing environments as an emerging and powerful technology in various industries.
Keywords
authorisation; client-server systems; cloud computing; cryptography; access control; access control model; authentication resources; client-based user authentication agent; cloud computing environments; cloud servers; cloud-based environment; cloud-based software-as-a-service application; cryptography agent; cryptography resources; data security; encryption processes; scalable user authentication scheme; security problems; Authentication; Cloud computing; Computational modeling; Encryption; Servers; Agent; Cloud Computing; Cryptography; Scalability; User Authentication;
fLanguage
English
Publisher
ieee
Conference_Titel
Region 10 Symposium, 2014 IEEE
Conference_Location
Kuala Lumpur
Print_ISBN
978-1-4799-2028-0
Type
conf
DOI
10.1109/TENCONSpring.2014.6863086
Filename
6863086
Link To Document