Mutual Authentication in Cloud Computing - A Review
Harpreet Kaur, Usvir Kaur "Mutual Authentication in Cloud Computing - A Review". International Journal of Computer Trends and Technology (IJCTT) V34(1):59-62, April 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
Cloud computing nowadays has been
involved in everyone’s life. This emerging technology
allows users to share its resources globally. Cloud
computing is aimed at providing IT as a service to the
cloud users on-demand basis with greater flexibility,
availability, reliability and scalability with utility
computing model. Among all researching areas of
cloud computing, mutual authentication is one of the
popular areas for researchers whose main task is to
attain a secure mutual authenticated environment by
using various approaches. This paper discussed
various types of mutual authentication techniques.
References
[1] V.K.Zadirakaa and A.M.Kudina “Cloud Computing in
Cryptography and Steganography” Cybernetics and
Systems Analysis, Springer, pp. 584-588, 2013.
[2] Nimmy K., M.Sethumadhavan “Novel Mutual
Authentication Protocol for Cloud Computing using
Secret Sharing and Steganography”, ICADIWT
(Applications of digital information and web
Technologies), IEEEfifth international conference
pp.101-106, 2014.
[3] Mrudula Sarvabhatla, M.Giri, Chandra Sekhar
Vorugunti “A Secure Mutual Authentication protocol
for Cloud Computing using Secret Sharing and
steganography”, Cloud Computing in Emerging
markets(CCEM) , IEEE, pp.1-8, 2014.
[4] G Yang, DS Wong, H Wang, X Deng” Two-factor
mutual authentication based on smart cards and
passwords”, journal of Computer and System Sciences ,
vol.74(7), pp.1160-1172, 2008
[5] Tien-Ho Chen, Hsiu-lien Yeh, Wei-kuan Shih “An
Advanced ECC Dynamic ID-Based Remote Mutual
Authentication Scheme for Cloud Computing” IEEE
conf. on Multimedia and Ubiquitous Engineering, 2011.
[6] www.google.com
[7] U.Somani, K.Lakhani; M.Mundra “implementing digital
signature with RSA encryption algorithm to enhance the
Data Security of Cloud in Cloud Computing” PDGC
(parallel distributed and grid computing), pp. 211-216,
2010.
[8] M.K.Ibrahem “Modification of Diffie-Hellman key
exchange algorithm for Zero knowledge proof”, future
Communication Networks (ICFCN), pp.147-152, 2012.
[9] F.F.Maghaddam, S.G.Moghaddam, S.Rouzbeh “A
Scalable and Efficient user Authentication Scheme for
Cloud Computing Environments”, IEEE, 2014.
[10] Te-Shun Chou “Security threats on cloud computing
vulnerabilities”, IJCSIT (International journal of
computer science and information technology), vol5,
pp.78-88, June 2013.
Keywords
Cloud computing, Mutual Authentication,
Encryption, Steganography.