Visible to the public GD2SA: Geo detection and digital signature authorization for secure accessing to cloud computing environments

TitleGD2SA: Geo detection and digital signature authorization for secure accessing to cloud computing environments
Publication TypeConference Paper
Year of Publication2014
AuthorsFatemi Moghaddam, F., Varnosfaderani, S.D., Mobedi, S., Ghavam, I., Khaleghparast, R.
Conference NameComputer Applications and Industrial Electronics (ISCAIE), 2014 IEEE Symposium on
Date PublishedApril
Keywordsauthentication, authorisation, Authorization, cloud computing, Computational modeling, digital signature authorization, digital signatures, GD2SA, geo detection, Geo-Detection, Internet, reliability, Second Verification, secure access, security, user authentication, virtualisation, virtualization
Abstract

Cloud computing is a new paradigm and emerged technology for hosting and delivering resources over a network such as internet by using concepts of virtualization, processing power and storage. However, many challenging issues are still unclear in cloud-based environments and decrease the rate of reliability and efficiency for service providers and users. User Authentication is one of the most challenging issues in cloud-based environments and according to this issue this paper proposes an efficient user authentication model that involves both of defined phases during registration and accessing processes. Geo Detection and Digital Signature Authorization (GD2SA) is a user authentication tool for provisional access permission in cloud computing environments. The main aim of GD2SA is to compare the location of an un-registered device with the location of the user by using his belonging devices (e.g. smart phone). In addition, this authentication algorithm uses the digital signature of account owner to verify the identity of applicant. This model has been evaluated in this paper according to three main parameters: efficiency, scalability, and security. In overall, the theoretical analysis of the proposed model showed that it can increase the rate of efficiency and reliability in cloud computing as an emerging technology.

URLhttps://ieeexplore.ieee.org/document/7010206
DOI10.1109/ISCAIE.2014.7010206
Citation Key7010206