Skip to main content

A New Framework of Authentication Over Cloud Computing

  • Conference paper
  • First Online:
Cybernetics Approaches in Intelligent Systems (CoMeSySo 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 661))

Included in the following conference series:

Abstract

The growth of local data annually implies extra charges for the customers, which makes their business slowing down. Cloud computing paradigm comes with new technologies that offer a very economic and cost-effective solution, but the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud and it is highly crucial to protect the sensitive data and systems in the cloud setting in order to ensure the privacy of its users. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Baruah, K.C.H., Banerjee, S., Dutta, M.P., Bhunia, C.T.: An improved biometric-based multi server authentication scheme using smart card. Int. J. Secur. Appl. 9(1), 397–408 (2015)

    Google Scholar 

  2. Clement, T.: The security in the cloud computing. Presented in CQSI, October 2012

    Google Scholar 

  3. Nithiavathy, R.: Data Integrity and Data Dynamics with Secure Storage Service in Cloud, Proceedings (2013)

    Google Scholar 

  4. Banerjee, S., Dutta, M.P., Bhunia, C.T.: An improved smart card based anonymous multi-server remote user authentication scheme. Int. J. Smart Home 9(5), 11–22 (2015)

    Article  Google Scholar 

  5. Kumbhare, A., Simmhan, P., Prasanna, V.: Cryptonite: a secure and performant data. In: IEEE 5th International Conference on Cloud Computing (CLOUD), pp. 510–519. IEEE (2016)

    Google Scholar 

  6. Huang, H., Liu, K.: Efficient key management for preserving HIPAA regulations. J. Syst. Softw. 84, 122–221 (2015)

    Google Scholar 

  7. El Makkaoui, K., Ezzati, A., Beni-Hssane, A., Motamed, C.: Data confidentiality in the word of cloud. J. Theor. Appl. Inf. Technol. 84(3) (2016)

    Google Scholar 

  8. Pippal, R.S., Wu, S.: Robust smart card authentication scheme for multi-server architecture. Wirel. Pers. Commun. 72(1), 729–745 (2013)

    Article  Google Scholar 

  9. Idrissi, H.K., Kartit, A., El Marraki, M.: A taxonomy and survey of cloud computing. Presented at the Security Days (JNS3), pp. 1–5 (2013)

    Google Scholar 

  10. Merkle, R.C.: A certified digital signature. In: Proceedings of 9th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO 1989, Santa Barbara, California, USA, vol. 435, pp. 218–238 (1989)

    Google Scholar 

  11. Sirohi, P., Agarwal, A.: Cloud computing data storage security framework relating to data integrity, privacy and trust, pp. 4–5 (2015)

    Google Scholar 

  12. Sun, X., Qu, S., Zhu, X., Zhang, M., Ren, Z., Yang, C.: Cloud storage architecture achieving privacy protection and sharing. Appl. Math. Inf. Sci. 9(3), 1639–1644 (2015)

    Google Scholar 

  13. Deyan, D.C., Zhao, H.: Data security and privacy protection issues in CC. In: IEEE International Conference on Computer Science and Electronics Engineering (ICCSEE) (2015)

    Google Scholar 

  14. Petit, A., Ben Mokhtar, L.B., Kosch, H.: Towards efficient and accurate privacy preserving web search. In: MW4NG 2014, Bordeaux, France, 8–12 December (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Megouache Leila .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Leila, M., Abdelhafid, Z., Mahieddine, D. (2018). A New Framework of Authentication Over Cloud Computing. In: Silhavy, R., Silhavy, P., Prokopova, Z. (eds) Cybernetics Approaches in Intelligent Systems. CoMeSySo 2017. Advances in Intelligent Systems and Computing, vol 661. Springer, Cham. https://doi.org/10.1007/978-3-319-67618-0_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67618-0_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67617-3

  • Online ISBN: 978-3-319-67618-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics