DocumentCode :
1799012
Title :
GD2SA: Geo detection and digital signature authorization for secure accessing to cloud computing environments
Author :
Fatemi Moghaddam, Faraz ; Varnosfaderani, Shirin Dabbaghi ; Mobedi, Soroush ; Ghavam, Iman ; Khaleghparast, Reza
Author_Institution :
Fac. of Comput. Sci. & IT, U.P.M. Univ., Serdang, Malaysia
fYear :
2014
fDate :
7-8 April 2014
Firstpage :
39
Lastpage :
42
Abstract :
Cloud computing is a new paradigm and emerged technology for hosting and delivering resources over a network such as internet by using concepts of virtualization, processing power and storage. However, many challenging issues are still unclear in cloud-based environments and decrease the rate of reliability and efficiency for service providers and users. User Authentication is one of the most challenging issues in cloud-based environments and according to this issue this paper proposes an efficient user authentication model that involves both of defined phases during registration and accessing processes. Geo Detection and Digital Signature Authorization (GD2SA) is a user authentication tool for provisional access permission in cloud computing environments. The main aim of GD2SA is to compare the location of an un-registered device with the location of the user by using his belonging devices (e.g. smart phone). In addition, this authentication algorithm uses the digital signature of account owner to verify the identity of applicant. This model has been evaluated in this paper according to three main parameters: efficiency, scalability, and security. In overall, the theoretical analysis of the proposed model showed that it can increase the rate of efficiency and reliability in cloud computing as an emerging technology.
Keywords :
authorisation; cloud computing; digital signatures; virtualisation; GD2SA; Internet; cloud computing; digital signature authorization; geo detection; secure access; user authentication; virtualization; Authentication; Authorization; Cloud computing; Computational modeling; Digital signatures; Reliability; Cloud Computing; Geo-Detection; Second Verification; Security; User Authentication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Applications and Industrial Electronics (ISCAIE), 2014 IEEE Symposium on
Conference_Location :
Penang
Print_ISBN :
978-1-4799-4352-4
Type :
conf
DOI :
10.1109/ISCAIE.2014.7010206
Filename :
7010206
Link To Document :
بازگشت