DocumentCode :
1799010
Title :
SUAS: Scalable user authentication scheme for secure accessing to cloud-based environments
Author :
Fatemi Moghaddam, Faraz ; Ravan, Rama Roshan ; Khodadadi, Touraj ; Javadianasl, Yashar ; Halalzadeh, Abbasali
Author_Institution :
Fac. of Comput. Sci. & IT, U.P.M. Univ. Selangor, Serdang, Malaysia
fYear :
2014
fDate :
7-8 April 2014
Firstpage :
33
Lastpage :
38
Abstract :
Cloud computing is an emerging technology that uses the concepts of virtualization, storage, and sharing to store and share resources between users and enterprises. This newfound technology is still unclear to many security problems and one of the most challenging issues in these environments is the reliability of the user authentication process. Therefore, this paper offers an efficient and scalable user authentication scheme for cloud-based environments. The proposed model uses the concepts of agents, cryptography, and key exchanging to enhance and improve the performance of the user authentication and the rate of scalability in cloud-based environments respectively. For achieving to this purpose, the proposed model has been presented based on three main agents: first user authentication agent, second user authentication agent and key manager agent. These agents have divided the process of user authentication and managing keys into several parts to improve the rate of efficiency in this process. Furthermore, the suggested model tries to resist against possible attacks. SUAS, as the suggested model was introduced and simulated in this paper for evaluating the performance and security of the scheme. In overall, the results show that the proposed model has considerable advantages for using in cloud-based environment to increase the salacity, reliability and efficiency of cloud computing models as an emerging technology.
Keywords :
authorisation; cloud computing; cryptography; virtualisation; SUAS; cloud computing; cloud-based environments; cryptography; key exchanging; key manager agent; scalable user authentication scheme; secure accessing; user authentication agent; user authentication process; virtualization; Authentication; Cloud computing; Computational modeling; Encryption; Servers; Cloud Computing; Cryptography; Key Exchanging; Scalability; User Authentication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Applications and Industrial Electronics (ISCAIE), 2014 IEEE Symposium on
Conference_Location :
Penang
Print_ISBN :
978-1-4799-4352-4
Type :
conf
DOI :
10.1109/ISCAIE.2014.7010205
Filename :
7010205
Link To Document :
بازگشت