DocumentCode :
1783661
Title :
An ID-Based User Authentication Scheme for Cloud Computing
Author :
Jen Ho Yang ; Pei Yu Lin
Author_Institution :
Dept. of Inf. & Electron. Commerce, Kainan Univ., Taoyuan, Taiwan
fYear :
2014
fDate :
27-29 Aug. 2014
Firstpage :
98
Lastpage :
101
Abstract :
In cloud computing environments, the user authentication scheme is an important security tool because it provides the authentication, authorization, and accounting for cloud users. Therefore, many user authentication schemes for cloud computing have been proposed in recent years. However, we find that most of the previous authentication schemes have some security problems. Besides, it cannot be implemented in cloud computing. To solve the above problems, we propose a new ID-based user authentication scheme for cloud computing in this paper. Compared with the related works, the proposed scheme has higher security levels and lower computation costs. In addition, it can be easily applied to cloud computing environments. Therefore, the proposed scheme is more efficient and practical than the related works.
Keywords :
authorisation; cloud computing; ID-based user authentication scheme; authorization; cloud computing environments; Authentication; Cloud computing; Cryptography; Law; Nickel; Servers; ID-based scheme; anonymity; cloud computing; cryptography; mobile devices; user authentication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on
Conference_Location :
Kitakyushu
Print_ISBN :
978-1-4799-5389-9
Type :
conf
DOI :
10.1109/IIH-MSP.2014.31
Filename :
6998277
Link To Document :
بازگشت