首页    期刊浏览 2025年02月19日 星期三
登录注册

文章基本信息

  • 标题:Authentication Techniques in Cloud and Mobile Cloud Computing
  • 本地全文:下载
  • 作者:Mahamudul Hasan ; Md. Hasnat Riaz ; Md. Auhidur Rahman
  • 期刊名称:International Journal of Computer Science and Network Security
  • 印刷版ISSN:1738-7906
  • 出版年度:2017
  • 卷号:17
  • 期号:11
  • 页码:28-39
  • 出版社:International Journal of Computer Science and Network Security
  • 摘要:A major challenge in cloud and mobile cloud computing is to ensure security and privacy of user’s personal information (e.g., financial data, health record, location information) from malicious attacks. It is important for a cloud service provider (CSP) to establish trust and gain confidence by providing proper security and privacy to the clients. Authentication is important for establishing accountability and authorization of the users while allocating cloud resources. Researchers have proposed several techniques, such as token-based, image and biometric based, to make the authentication process more efficient, secure and user friendly. In this paper, we discuss different authentication techniques proposed for both cloud and mobile cloud computing environments. We categorize the algorithms based on its input, i.e. the credentials required for validating users. However, we emphasize that the classification is not precise, as it is difficult to classify the authentication algorithms relying on more than one user credentials (multi-factor authentication). To understand the complexity and delay of an authentication process, we focus on the number of entities involved in an authentication process and the number of handshakes taking place between them. We also compare the authentication algorithms on the basis of design principles and popular security attacks.
  • 关键词:Could Computing; Mobile Cloud computing; Authentication; Confidentiality; Integrity.
国家哲学社会科学文献中心版权所有