A scalable and efficient user authentication scheme for cloud computing environments

Cloud computing is an emerging technology that is still unclear to many security problems and user authentication, access control, and ensuring the security of stored data in cloud servers are the most challenging issues in cloud-based environment. Accordingly, this paper offers an efficient and sca...

Full description

Saved in:
Bibliographic Details
Main Authors: Moghaddam F.F., Moghaddam S.G., Rouzbeh S., Araghi S.K., Alibeigi N.M., Varnosfaderani S.D.
Other Authors: 56032500000
Format: Conference Paper
Published: Institute of Electrical and Electronics Engineers Inc. 2023
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-21883
record_format dspace
spelling my.uniten.dspace-218832023-05-16T10:45:52Z A scalable and efficient user authentication scheme for cloud computing environments Moghaddam F.F. Moghaddam S.G. Rouzbeh S. Araghi S.K. Alibeigi N.M. Varnosfaderani S.D. 56032500000 56426854400 56426927300 56426953300 56426998800 56426957500 Cloud computing is an emerging technology that is still unclear to many security problems and user authentication, access control, and ensuring the security of stored data in cloud servers are the most challenging issues in cloud-based environment. Accordingly, this paper offers an efficient and scalable user authentication scheme for cloud computing environment. It the suggested model, various tools and techniques have been introduced and used by using the concept of agent. Therefore, a client-based user authentication agent has been introduced to confirm identity of the user in client-side. Furthermore, a cloud-based software-as-a-service application has been used to confirm the process of authentication for unregistered devices. Moreover, there are two separate servers for storing authentication and cryptography resources from main servers to decrease the dependency of user authentication and encryption processes from main server. Cryptography agent was also introduced to encrypt resources before storing on cloud servers. In overall, the theoretical analysis of the suggested scheme shows that, designing this user authentication and access control model will enhance the reliability and rate of trust in cloud computing environments as an emerging and powerful technology in various industries. © 2014 IEEE. Final 2023-05-16T02:45:52Z 2023-05-16T02:45:52Z 2014 Conference Paper 2-s2.0-84911974923 https://www.scopus.com/inward/record.uri?eid=2-s2.0-84911974923&partnerID=40&md5=70eb182b6ad26fbe439cf0d463cac8fc https://irepository.uniten.edu.my/handle/123456789/21883 6863086 508 513 Institute of Electrical and Electronics Engineers Inc. Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
description Cloud computing is an emerging technology that is still unclear to many security problems and user authentication, access control, and ensuring the security of stored data in cloud servers are the most challenging issues in cloud-based environment. Accordingly, this paper offers an efficient and scalable user authentication scheme for cloud computing environment. It the suggested model, various tools and techniques have been introduced and used by using the concept of agent. Therefore, a client-based user authentication agent has been introduced to confirm identity of the user in client-side. Furthermore, a cloud-based software-as-a-service application has been used to confirm the process of authentication for unregistered devices. Moreover, there are two separate servers for storing authentication and cryptography resources from main servers to decrease the dependency of user authentication and encryption processes from main server. Cryptography agent was also introduced to encrypt resources before storing on cloud servers. In overall, the theoretical analysis of the suggested scheme shows that, designing this user authentication and access control model will enhance the reliability and rate of trust in cloud computing environments as an emerging and powerful technology in various industries. © 2014 IEEE.
author2 56032500000
author_facet 56032500000
Moghaddam F.F.
Moghaddam S.G.
Rouzbeh S.
Araghi S.K.
Alibeigi N.M.
Varnosfaderani S.D.
format Conference Paper
author Moghaddam F.F.
Moghaddam S.G.
Rouzbeh S.
Araghi S.K.
Alibeigi N.M.
Varnosfaderani S.D.
spellingShingle Moghaddam F.F.
Moghaddam S.G.
Rouzbeh S.
Araghi S.K.
Alibeigi N.M.
Varnosfaderani S.D.
A scalable and efficient user authentication scheme for cloud computing environments
author_sort Moghaddam F.F.
title A scalable and efficient user authentication scheme for cloud computing environments
title_short A scalable and efficient user authentication scheme for cloud computing environments
title_full A scalable and efficient user authentication scheme for cloud computing environments
title_fullStr A scalable and efficient user authentication scheme for cloud computing environments
title_full_unstemmed A scalable and efficient user authentication scheme for cloud computing environments
title_sort scalable and efficient user authentication scheme for cloud computing environments
publisher Institute of Electrical and Electronics Engineers Inc.
publishDate 2023
_version_ 1806423421227106304
score 13.214268