DocumentCode
680300
Title
Secure user authentication in cloud computing
Author
Javaid, Zarrar ; Ijaz, Imran
Author_Institution
Shaheed Zulfikar Ali Bhutto Inst. of Sci. & Technol., Islamabad, Pakistan
fYear
2013
fDate
14-15 Dec. 2013
Firstpage
1
Lastpage
5
Abstract
Cloud the industrial blockbuster of the era providing a list of benefits but suffering many problems with the rapid increase of clients, using different policies. With the passage of time many question arises on the security and performance of cloud, many issues originate because weak authentication process of the cloud servers and credentials openly travel in public internet which causes the breech in authentication process. Many new authentication schemes made and vary time to time to overcome the loop holes. This work suggests the model for hiding the authentication credentials travel on public internet.
Keywords
cloud computing; security of data; authentication credentials; authentication process; authentication schemes; cloud computing; cloud performance; cloud security; public Internet; user authentication security; Authentication; Cloud computing; Computational modeling; Servers; Time factors; Virtual private networks; Cloud Computing; Credentials Hiding; Secure User Authentication; VPN Cloud Tunneling;
fLanguage
English
Publisher
ieee
Conference_Titel
Information & Communication Technologies (ICICT), 2013 5th International Conference on
Conference_Location
Karachi
Print_ISBN
978-1-4799-2621-3
Type
conf
DOI
10.1109/ICICT.2013.6732775
Filename
6732775
Link To Document