Analysis and Improvement of User Authentication Framework for Cloud Computing

Article Preview

Abstract:

Cloud Computing, as an emerging, virtual, large-scale distributed computing model, has gained increasing attention these years. Meanwhile it also faces many secure challenges, one of which is authentication. Amlan Jyoti Choudhury et al proposed a user authentication framework to ensure user legitimacy before entering into the cloud. However, the scheme is found to suffer from some attacks through our analysis. In this paper, we firstly analyze few attacks and the make an improvement on the user authentication framework. Our new protocol ensures that only legitimate users can access the cloud service based on smartcard. Security analysis shows our proposed scheme is secure under standard cryptographic.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

3482-3486

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Michael Armbrust , Armando Fox , Rean Griffith , Anthony D. Joseph , Randy Katz , Andy Konwinski , Gunho Lee , David Patterson , Ariel Rabkin , Ion Stoica , Matei Zaharia, A view of cloud computing, Communications of the ACM, v. 53 n. 4, April (2010).

DOI: 10.1145/1721654.1721672

Google Scholar

[2] Chun-Ting Huang, Zhongyuan Qin, C. -C. Jay Ku, Multimedia Storage Security in Cloud Computing: An Overview, 13th International Workshop on Multimedia Signal Processing (MMSP), (2011).

DOI: 10.1109/mmsp.2011.6093775

Google Scholar

[3] Jack Newton, Beyond Passwords: Two Factor Authentication Comes to the Cloud.

Google Scholar

[4] L. Lamport, Password authentication with insecure communication, Comm. ACM 24(11), Nov 1981, 770–771.

DOI: 10.1145/358790.358797

Google Scholar

[5] M.S. Hwang, and L.H. Li, A New Remote User Authentication Scheme using Smart Cards, IEEE Transactions on Consumer Electronics 46 (1) (2000) 28-30.

DOI: 10.1109/30.826377

Google Scholar