Security of Cloud Computing Lightweight Authentication Protocol

Abstract:

Article Preview

Nowadays, network bandwidth and hardware technology are developing rapidly, resulting in the vigorous development of the Internet. However, cloud computing, an Internet-based development in which dynamically scalable and often virtualized resources are provided as a service over the Internet has become a significant issue. According to the characteristics of cloud computing, there are a lot of applications and data centers in the cloud-computing environment, hence, the issues of information and communication security and authentication must to be considered. However, the most of the studies on the security and authentication require large amounts of computing resource; therefore not suitable for the cloud-computing environment. In this paper, a lightweight computing protocol, Lightweight Authentication Protocol (LAP), is proposed to enhance the security of cloud computing environment and provide the authentication of service.

Info:

Periodical:

Edited by:

Wen-Hsiang Hsieh

Pages:

3502-3506

DOI:

10.4028/www.scientific.net/AMM.284-287.3502

Citation:

S. C. Wang et al., "Security of Cloud Computing Lightweight Authentication Protocol", Applied Mechanics and Materials, Vols. 284-287, pp. 3502-3506, 2013

Online since:

January 2013

Export:

Price:

$35.00

[1] S.A. Almulla and Y.Y. Chan: Cloud Computing Security Management. Proceedings of the 2010 2nd International Conference on Engineering Systems Management and Its Applications (ICESMA2010), pp.1-7.

[2] N. Gruschka and M. Jensen: Attack Surfaces: A Taxonomy for Attacks on Cloud Services. Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing, pp.276-279.

DOI: 10.1109/cloud.2010.23

[3] M. Jensen, J. Schwenk, N. Gruschka and L.L. Iacono: On Technical Security Issues in Cloud Computing. Proceedings of IEEE International Conference on Cloud Computing (2009), pp.109-116.

DOI: 10.1109/cloud.2009.60

[4] L.M. Kaufman: Data Security in the World of Cloud Computing, IEEE Security & Privacy, Vol. 7, No. 4 (2009), pp.61-64.

[5] Y. Luo: Network I/O Virtualization for Cloud Computing. IT Professional, Vol. 12, No. 5, pp.36-41.

[6] R. Oppliger, R:. Hauser and D. Basin. SSL/TLS Session-Aware User Authentication. Computer, Vol. 41, No. 3 (2008), pp.59-65.

DOI: 10.1109/mc.2008.98

[7] S. Ramgovind, M.M. Eloff and E. Smith: The Management of Security in Cloud Computing. Proceedings of the 2010 Information Security for South Africa (ISSA), pp.1-7.

DOI: 10.1109/issa.2010.5588290

[8] B.P. Rimal, E. Choi and I. Lumb: A Taxonomy and Survey of Cloud Computing, Proceedings of the NCM2009 5th International Joint Conference on INC, IMS and IDC, pp.44-51).

DOI: 10.1109/ncm.2009.218

[9] W.G. Tzeng. Data Confidentiality and Robustness in Decentralized Cloud Storage Systems. Dissertation of National Chiao Tung University (2010).

[10] G. Wang and T.S.E. Ng. The Impact of Virtualization on Network Performance of Amazon EC2 Data Center. Proceedings of the 29th IEEE Conference on Computer Communications (2010), pp.1-9.

[11] L.C. Wang, K. Ren, W.J. Lou and J. Li. Toward Publicly Auditable Secure Cloud Data Storage Services, IEEE Network, Vol. 24, No. 4 (2010), pp.19-24.

DOI: 10.1109/mnet.2010.5510914

[12] T.C. Yeh, Y.J. Wang, T.C. Kuo and S.S. Wang: Securing RFID Systems Conforming to EPC Class 1 Generation 2 Standard. Expert Systems with Applications, Vol. 37, No. 12 (2010), pp.7678-7683.

DOI: 10.1016/j.eswa.2010.04.074

[13] Cloud Guide, Cloud Security Alliance. (December 2009).

[14] Cloud Threats, Cloud Security Alliance. (March 2010).

In order to see related information, you need to Login.