Title :
SUAS: Scalable user authentication scheme for secure accessing to cloud-based environments
Author :
Fatemi Moghaddam, Faraz ; Ravan, Rama Roshan ; Khodadadi, Touraj ; Javadianasl, Yashar ; Halalzadeh, Abbasali
Author_Institution :
Fac. of Comput. Sci. & IT, U.P.M. Univ. Selangor, Serdang, Malaysia
Abstract :
Cloud computing is an emerging technology that uses the concepts of virtualization, storage, and sharing to store and share resources between users and enterprises. This newfound technology is still unclear to many security problems and one of the most challenging issues in these environments is the reliability of the user authentication process. Therefore, this paper offers an efficient and scalable user authentication scheme for cloud-based environments. The proposed model uses the concepts of agents, cryptography, and key exchanging to enhance and improve the performance of the user authentication and the rate of scalability in cloud-based environments respectively. For achieving to this purpose, the proposed model has been presented based on three main agents: first user authentication agent, second user authentication agent and key manager agent. These agents have divided the process of user authentication and managing keys into several parts to improve the rate of efficiency in this process. Furthermore, the suggested model tries to resist against possible attacks. SUAS, as the suggested model was introduced and simulated in this paper for evaluating the performance and security of the scheme. In overall, the results show that the proposed model has considerable advantages for using in cloud-based environment to increase the salacity, reliability and efficiency of cloud computing models as an emerging technology.
Keywords :
authorisation; cloud computing; cryptography; virtualisation; SUAS; cloud computing; cloud-based environments; cryptography; key exchanging; key manager agent; scalable user authentication scheme; secure accessing; user authentication agent; user authentication process; virtualization; Authentication; Cloud computing; Computational modeling; Encryption; Servers; Cloud Computing; Cryptography; Key Exchanging; Scalability; User Authentication;
Conference_Titel :
Computer Applications and Industrial Electronics (ISCAIE), 2014 IEEE Symposium on
Conference_Location :
Penang
Print_ISBN :
978-1-4799-4352-4
DOI :
10.1109/ISCAIE.2014.7010205