• DocumentCode
    680300
  • Title

    Secure user authentication in cloud computing

  • Author

    Javaid, Zarrar ; Ijaz, Imran

  • Author_Institution
    Shaheed Zulfikar Ali Bhutto Inst. of Sci. & Technol., Islamabad, Pakistan
  • fYear
    2013
  • fDate
    14-15 Dec. 2013
  • Firstpage
    1
  • Lastpage
    5
  • Abstract
    Cloud the industrial blockbuster of the era providing a list of benefits but suffering many problems with the rapid increase of clients, using different policies. With the passage of time many question arises on the security and performance of cloud, many issues originate because weak authentication process of the cloud servers and credentials openly travel in public internet which causes the breech in authentication process. Many new authentication schemes made and vary time to time to overcome the loop holes. This work suggests the model for hiding the authentication credentials travel on public internet.
  • Keywords
    cloud computing; security of data; authentication credentials; authentication process; authentication schemes; cloud computing; cloud performance; cloud security; public Internet; user authentication security; Authentication; Cloud computing; Computational modeling; Servers; Time factors; Virtual private networks; Cloud Computing; Credentials Hiding; Secure User Authentication; VPN Cloud Tunneling;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information & Communication Technologies (ICICT), 2013 5th International Conference on
  • Conference_Location
    Karachi
  • Print_ISBN
    978-1-4799-2621-3
  • Type

    conf

  • DOI
    10.1109/ICICT.2013.6732775
  • Filename
    6732775