A scalable and efficient user authentication scheme for cloud computing environments
Cloud computing is an emerging technology that is still unclear to many security problems and user authentication, access control, and ensuring the security of stored data in cloud servers are the most challenging issues in cloud-based environment. Accordingly, this paper offers an efficient and sca...
Saved in:
Main Authors: | , , , , , |
---|---|
Other Authors: | |
Format: | Conference Paper |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-21883 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-218832023-05-16T10:45:52Z A scalable and efficient user authentication scheme for cloud computing environments Moghaddam F.F. Moghaddam S.G. Rouzbeh S. Araghi S.K. Alibeigi N.M. Varnosfaderani S.D. 56032500000 56426854400 56426927300 56426953300 56426998800 56426957500 Cloud computing is an emerging technology that is still unclear to many security problems and user authentication, access control, and ensuring the security of stored data in cloud servers are the most challenging issues in cloud-based environment. Accordingly, this paper offers an efficient and scalable user authentication scheme for cloud computing environment. It the suggested model, various tools and techniques have been introduced and used by using the concept of agent. Therefore, a client-based user authentication agent has been introduced to confirm identity of the user in client-side. Furthermore, a cloud-based software-as-a-service application has been used to confirm the process of authentication for unregistered devices. Moreover, there are two separate servers for storing authentication and cryptography resources from main servers to decrease the dependency of user authentication and encryption processes from main server. Cryptography agent was also introduced to encrypt resources before storing on cloud servers. In overall, the theoretical analysis of the suggested scheme shows that, designing this user authentication and access control model will enhance the reliability and rate of trust in cloud computing environments as an emerging and powerful technology in various industries. © 2014 IEEE. Final 2023-05-16T02:45:52Z 2023-05-16T02:45:52Z 2014 Conference Paper 2-s2.0-84911974923 https://www.scopus.com/inward/record.uri?eid=2-s2.0-84911974923&partnerID=40&md5=70eb182b6ad26fbe439cf0d463cac8fc https://irepository.uniten.edu.my/handle/123456789/21883 6863086 508 513 Institute of Electrical and Electronics Engineers Inc. Scopus |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
description |
Cloud computing is an emerging technology that is still unclear to many security problems and user authentication, access control, and ensuring the security of stored data in cloud servers are the most challenging issues in cloud-based environment. Accordingly, this paper offers an efficient and scalable user authentication scheme for cloud computing environment. It the suggested model, various tools and techniques have been introduced and used by using the concept of agent. Therefore, a client-based user authentication agent has been introduced to confirm identity of the user in client-side. Furthermore, a cloud-based software-as-a-service application has been used to confirm the process of authentication for unregistered devices. Moreover, there are two separate servers for storing authentication and cryptography resources from main servers to decrease the dependency of user authentication and encryption processes from main server. Cryptography agent was also introduced to encrypt resources before storing on cloud servers. In overall, the theoretical analysis of the suggested scheme shows that, designing this user authentication and access control model will enhance the reliability and rate of trust in cloud computing environments as an emerging and powerful technology in various industries. © 2014 IEEE. |
author2 |
56032500000 |
author_facet |
56032500000 Moghaddam F.F. Moghaddam S.G. Rouzbeh S. Araghi S.K. Alibeigi N.M. Varnosfaderani S.D. |
format |
Conference Paper |
author |
Moghaddam F.F. Moghaddam S.G. Rouzbeh S. Araghi S.K. Alibeigi N.M. Varnosfaderani S.D. |
spellingShingle |
Moghaddam F.F. Moghaddam S.G. Rouzbeh S. Araghi S.K. Alibeigi N.M. Varnosfaderani S.D. A scalable and efficient user authentication scheme for cloud computing environments |
author_sort |
Moghaddam F.F. |
title |
A scalable and efficient user authentication scheme for cloud computing environments |
title_short |
A scalable and efficient user authentication scheme for cloud computing environments |
title_full |
A scalable and efficient user authentication scheme for cloud computing environments |
title_fullStr |
A scalable and efficient user authentication scheme for cloud computing environments |
title_full_unstemmed |
A scalable and efficient user authentication scheme for cloud computing environments |
title_sort |
scalable and efficient user authentication scheme for cloud computing environments |
publisher |
Institute of Electrical and Electronics Engineers Inc. |
publishDate |
2023 |
_version_ |
1806423421227106304 |
score |
13.214268 |