Open Access Open Access  Restricted Access Subscription or Fee Access

User Authentication Mechanism for Sharing E-Resource in Educational Clouds

I. Arulmani, L. Arockiam, N. Veeraragavan

Abstract


Cloud computing is a computing environment centre on clients and to access the programs or documents stored correspondingly in servers. In this paper we have discussed mainly on cloud computing environment in educational system. The educational learning, utilising e-resources can be done between two or more educational institutions with community cloud computing. The authentication should not depend (or) should not matter where the user is all over the world. It should be noted only the user can use the methodology anywhere in the world by the communication. We used most recent criteria for authentication process like communication between user and server with highly secured two levels security model. Global Positioning System (GPS) and Mobile Tracking Software (MTS) were used main resources. With the help of mobile phone and internet, the password is transferred in two level processes. Community cloud computing is focussed in order to make use of two or more users can be provided the cloud services.

Keywords


Authentication, Community Cloud, E-Resource, Educational Learning, Global Positioning System (GPS), Mobile Tracking Software (MTS)

Full Text:

PDF

References


G.A.Patil, and S.B.Patil,”Data Security Mechanism for Cloud”, International Journal of Computer Application, pp. 24-27, 2011.

Hyokyung Chang, and Euiin Choi, “User Authentication in Cloud Computing”, Communications in Computer and Information Science, vol. 151, pp. 338-342, 2011.

Joao Paulo Barraca, Alfredo Matos, and Rui L.Aguiar,” User Centric Community Clouds”, Wireless Personal Communications, Vol. 48, no. 1, pp. 31-48, Jul 2011.

Hongwei Li, Yuanshun Dai, Ling Tian , and Haomiao Yang,” Identity-Based Authentication for Cloud Computing”, International Conference on Cloud Computing, vol. 5931, pp.157-166, 2009.

Jin-Song Xu, Ru-Cheng Huang, Wan-Ming Huang, and Geng Yang, ” Secure Document Service for Cloud Computing”, International Conference on Cloud, vol. 5931, pp.541-546, 2009.

Zhidong Shen, and Qiang Tong, “The security of Cloud Computing System enabled by Trusted Computing Technology”, International Conference on Signal Processing Systems, pp. 11-15, 2010.

Shalini Gupta,”Cloud Computing in Education in Current Financial Crisis”, International Conference on Technology and Business Management, pp. 325-330, March 26-28, 2012.

Xiao Laisheng, and Wang Zhengxia,” Cloud Computing: a New Business Paradigm for E-learning”, International Conference on Measuring Technology and Mechatronics Automation, pp. 716-719, 2011.

Mohssen M.Alabbadi, “Cloud Computing for Education and Learning: Education and Learning as a Service (ELaaS)”, International Conference on Interactive Collaborative Learning, pp. 589-594, 2011.

Liang Yan, Chunming Rong, and Gansen Zhao,” Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical identity-Based Cryptography”, International Conference on Cloud Computing, vol. 5931, pp.167-177, 2009.

Danny Harnik, Elliot K.Kolodner, Shahar Ronen, Julian Satran, Alexandra Shulman-Peleg, and Sivan Tal,” Secure Access Mechanism for Cloud Storage”, Scientific International Journal Parallel and Distributed Computing, Vol. 12, pp. 317-336, 2011.

Fred Cheng,” Security Attack Safe Mobile and Cloud-based One-time Password Tokens Using Rubbing Encryption Algorithm”, Journal Mobile Networks and Applications, vol. 16, pp. 304-336, 2011.

Mahbub Ahmed, Yang Xiang, and Shawkat Ali,” Above the Trust and Security in Cloud Computing: A Notion towards Innovation”, International Conference on Embedded and Ubiquitous Computing, pp. 723-730, 2010.

Hyosik Ahn, Hyokyung Chang, Changbok Jang, and Euiin Choi, ”User Authentication Platform using Provisioning in Cloud Computing Environment”, Communications in computer and information science,vol.199, pp. 132-138, 2011.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.