Distributed authentication in the cloud computing environment

2Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The cloud computing is considered as the next-generation of IT technology that can provide various elastic and scalable IT services in pay-as-you-go. This technology has been used by worldwide companies to improve their business performance. Therefore, authentication of both clients and services is a significant issue for the trust and security of the cloud computing. At present, to protect the security of the cloud, many ideas have been proposed. In this paper, we present DSA protocol concentrated on authentication of clients. It is an improved protocol based on Kerberos, which prevents password guessing attack by using dynamic session key. We also solved the problem of service availability by introducing two additional messages in the scheme.

Cite

CITATION STYLE

APA

Liu, Y., Li, Z., & Sun, Y. (2015). Distributed authentication in the cloud computing environment. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9532, pp. 810–818). Springer Verlag. https://doi.org/10.1007/978-3-319-27161-3_74

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free