An ID-Based User Authentication Scheme for Cloud Computing
Title | An ID-Based User Authentication Scheme for Cloud Computing |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Jen Ho Yang, Pei Yu Lin |
Conference Name | Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on |
Date Published | Aug |
Keywords | anonymity, authentication, authorisation, Authorization, cloud computing, cloud computing environments, cryptography, ID-based scheme, ID-based user authentication scheme, Law, mobile devices, Nickel, Servers, user authentication |
Abstract | In cloud computing environments, the user authentication scheme is an important security tool because it provides the authentication, authorization, and accounting for cloud users. Therefore, many user authentication schemes for cloud computing have been proposed in recent years. However, we find that most of the previous authentication schemes have some security problems. Besides, it cannot be implemented in cloud computing. To solve the above problems, we propose a new ID-based user authentication scheme for cloud computing in this paper. Compared with the related works, the proposed scheme has higher security levels and lower computation costs. In addition, it can be easily applied to cloud computing environments. Therefore, the proposed scheme is more efficient and practical than the related works. |
URL | http://ieeexplore.ieee.org/document/6998277/ |
DOI | 10.1109/IIH-MSP.2014.31 |
Citation Key | 6998277 |