Header menu link for other important links
X
User authentication scheme in cloud computing
H. Agrawal, A. Thakur, R. Slathia,
Published in Research India Publications
2015
Volume: 10
   
Issue: 8
Pages: 20767 - 20778
Abstract
Cloud computing is a way of computing which enables the user(individual user) or group(companies or organization) to on-demand access the available universal computing resources on sharing basis which means that it do not have to own the resources(server, storage and application) and can use multiple servers through internet rapidly and conveniently. Cloud is also suffering from many issues which needs to be solved and one of them is user authentication, as cloud is vulnerable to unauthorized usage with the exponential increase in the cloud users. Some user authentication schemes are Two factor authentication(2FA), Elliptic Curve Cryptography(ECC), Ticket authentication, MD5, MD6(message-digest) Graphical passwords and many more. This paper aims at development of a new user authentication scheme for identification of legitimate users to secure the cloud resources.This paper tries to existing schemes and overcome some of the loop holes present in them regarding the user authentication in cloud environment. © Research India Publications.
About the journal
JournalInternational Journal of Applied Engineering Research
PublisherResearch India Publications
ISSN09734562