Unified Login Authentication Method Based on Cloud Computing

Article Preview

Abstract:

According to the single sign-on authentication mode, cloud computing unified login authentication method was put forward, and point set topology changing method was used for generating fractal random key, improved login authentication safety grade. Firstly, analyzed cloud computing login authentication system structure, and then used network public databases of fingerprint image as an example do fractal changes ring operation, generated a pseudo-random sequence, then the sequence encrypted and sent to the server for authentication through UDP. Lastly, made a simulation example.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 926-930)

Pages:

2245-2248

Citation:

Online since:

May 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] H. M, Powell, K. Nakia, Y. Dexter, et al. Cloud computing and security challenges[C]. 50th Annual Association for Computing Machinery Southeast Conference, 2012: 298-302.

Google Scholar

[2] S. Arshad, T. Junaid, Townend. Cloud computing security: Opportunities and pitfalls[J]. International Journal of Grid and High Performance Computing, v4, n1, January-March 2012: 52-66.

DOI: 10.4018/jghpc.2012010104

Google Scholar

[3] C.T. Yu, D.Q. Xie, X.H. Yang. Research and implementation of security SS0 authentication modelbased on SAML and XKMS[J]. Application Research of Couputers, 2010, 27(3): 1019-1021.

Google Scholar

[4] W.H. Feng, Y.L. Liu. Design and implementation of unified authentication system on cookie[J]. Computer Engineering and Design, 2010, 31(23): 4971-4975.

Google Scholar

[5] H.H. Zhu, Q.H. He, H. Tang. Voiceprint-biometric template design and authentication based on cloud computing security[C]. 2011 International Conference on Cloud and Service Computing, CSC 2011: 302-308.

DOI: 10.1109/csc.2011.6138538

Google Scholar