Mutual authentication scheme for cloud computing

4Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing is known as one of the big next things in Information Communication Technology world. Cloud computing offers a lot of cost and efficiency benefits to the business, but it also introduce significant security vulnerabilities. Data security always becomes a big concern whenever customers lose physical control on their data. Sensitive data processed outside the enterprise need to be assurance that they are only accessible and propagate to the privileged users. In this paper, we proposed a mutual authentication that allow cloud user and cloud remote server to authenticate each other as we believed it is crucial to protect not only the server but also the legitimate users from security threats. Unlike one way authentication, in mutual authentication, client must proves its identity to server and the server must proves its identity to client before any access have been granted or any application traffic is sent over the client-server connection. © 2013 Springer Science+Business Media Dordrecht.

Cite

CITATION STYLE

APA

Lee, S., Kim, T. Y., & Lee, H. J. (2013). Mutual authentication scheme for cloud computing. In Lecture Notes in Electrical Engineering (Vol. 235 LNEE, pp. 149–157). https://doi.org/10.1007/978-94-007-6516-0_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free