Open Access Open Access  Restricted Access Subscription or Fee Access

Survey on User Authentication for Cloud Computing

I. Arulmani, Dr. L. Arockiam, N. Veeraragavan

Abstract


Cloud computing is scattering widely, users and service providers enables to use resource or service inexpensively and simply without owning all the resource required. In this paper, it was discussed the brief as well as overview of user authentication, including the concept of authentication and various publication of authentication. Authentication plays a vital role in cloud computing, hereby, we discuss the surveys done for user authentication, its methodology, author motivation, his contribution, issues, drawbacks etc. The composition of this paper involves: Base Concepts of Authentication, User Authentication, Various Publication and its issues and conclusion. By discussing the above mentioned criteria the better idea and hierarchical approach and challenges were showed up. The level of security and its improvements were mentioned in its types. As the cloud is the new technology among the plenty users, its security should get updated as per trend, which was discussed.

Keywords


Challenges, Hierarchical Approach, Publication, User Authentication, Security

Full Text:

PDF

References


Alexa Huth, James Cebule,” The Basics of Cloud Computing,” The NIST Definition of Cloud Computing at http://csrc.nist.gov/publications/drafts/800-145/Draft-SP-800-145-cloud -definition,pp. 1-4, 2011.

Hyokyung Chang, Euiin Choi, “User Authentication in Cloud Computing”, Communications in Computer and Information Science, vol. 151, pp. 338-342, 2011.

Joao Paulo Barraca, Alfredo Matos, Rui L.Aguiar,” User Centric Community Clouds”, Wireless Pers Commun, vol. 58, pp. 31-48, 2011.

Hongwei Li, Yuanshun Dai, Ling Tian and Haomiao Yang,” Identity-Based Authentication for Cloud Computing”, International Conference on Cloud Computing, vol. 5931, pp.157-166, 2009.

Jin-Song Xu, Ru-Cheng Huang, Wan-Ming Huang, Geng Yang,” Secure Document Service for Cloud Computing”, International Conference on Cloud Computing, vol. 5931, pp.541-546, 2009.

Zhidong Shen, Qiang Tong, “The security of Cloud Computing System enabled by Trusted Computing Technology”, International Conference on Signal Processing Systems, pp. 11-15, 2010.

Dr.Gurdev Singh, Amit Sharma, Rajbrinder Singh,” Assorted Security Facets Associated with Cloud Database”, International Journal of Computer Science and Technology, vol. 2, pp. 72-76, September 2011.

Fred Cheng,” Security Attack Safe Mobile and Cloud-based One-time Password Tokens Using Rubbing Encryption Algorithm”, Journal Mobile Networks and Applications, vol. 16, pp. 304-336, 2011.

Francesco Tusa, Antonio celesti, Rao Mikkilineni,” AAA in a Cloud-Based Virtual DIME Network Architecture (DNA)”, International Workshops on Enabling Technologies, 2011.

Sowmya Suryadevara, Shuchita Kapoor, Shweta Dhatterwal, Rohaila Naaz, Anand Sharma,” Tongue as a Biometric Virtualizes New Prospects of Cloud Computing Security”, International Conference on Information and Network Technology, Vol. 4, pp 73-78, 2011.

Zhen-Yu Wu, Yufang Chung, Feipei Lai, Tzer-Shyong Chen, “A Password-Based User Authentication Scheme for the Integrated EPR Information System”, Journal of Medical Systems, vol. 36, pp.631-638, 2012.

Liang Yan, Chunming Rong, Gansen Zhao,” Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical identity-Based Cryptography”, International Conference on Cloud Computing, vol. 5931, pp.167-177, 2009.

Ahmad-Reza Sadeghi, Thomas Schneider, Marcel Winandy,” Token-Based Cloud Computing: Secure Outsourcing of Data and Arbitrary Computations with Lower Latency,” International Conference on Trust and Trustworthy Computing, vol. 6101, pp.417-429, 2010.

Mahbub Ahmed, Yang Xiang, Shawkat Ali,” Above the Trust and Security in Cloud Computing: A Notion towards Innovation”, International Conference on Embedded and Ubiquitous Computing, pp. 723-730, 2010.

Danny Harnik, Elliot K.Kolodner, Shahar Ronen, Julian Satran, Alexandra Shulman-Peleg, Sivan Tal,” Secure Access Mechanism for Cloud Storage”, Workshop on Software Service: Cloud Computing and Applications Based on Software Services, Vol. 12, pp. 317–336, June 2011.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.