ID-Based User Authentication Scheme for Cloud Computing |
| |
Authors: | Ping-Liang Chen Jen-Ho Yang Ching-I Lin |
| |
Affiliation: | 1.Department of Multimedia and Mobile Commerce,Kainan University,Taoyuan;2.Department of Nutrition and Health Sciences,Kainan University,Taoyuan |
| |
Abstract: | In cloud computing environments, user authentication is an important security mechanism because it provides the fundamentals of authentication, authorization, and accounting (AAA). In 2009, Wang et al. proposed an identity-based (ID-based) authentication scheme to deal with the user login problem for cloud computing. However, Wang et al.'s scheme is insecure against message alteration and impersonation attacks. Besides, their scheme has large computation costs for cloud users. Therefore, we propose a novel ID-based user authentication scheme to solve the above mentioned problems. The proposed scheme provides anonymity and security for the user who accesses different cloud servers. Compared with the related schemes, the proposed scheme has less computation cost so it is very efficient for cloud computing in practice. |
| |
Keywords: | Anonymity cloud computing identity-based scheme user authentication user identity. |
本文献已被 维普 等数据库收录! |
| 点击此处可从《电子科技学刊:英文版》浏览原始摘要信息 |
|
点击此处可从《电子科技学刊:英文版》下载免费的PDF全文 |
|