首页 | 本学科首页   官方微博 | 高级检索  
     


ID-Based User Authentication Scheme for Cloud Computing
Authors:Ping-Liang Chen  Jen-Ho Yang  Ching-I Lin
Affiliation:1.Department of Multimedia and Mobile Commerce,Kainan University,Taoyuan;2.Department of Nutrition and Health Sciences,Kainan University,Taoyuan
Abstract:In cloud computing environments, user authentication is an important security mechanism because it provides the fundamentals of authentication, authorization, and accounting (AAA). In 2009, Wang et al. proposed an identity-based (ID-based) authentication scheme to deal with the user login problem for cloud computing. However, Wang et al.'s scheme is insecure against message alteration and impersonation attacks. Besides, their scheme has large computation costs for cloud users. Therefore, we propose a novel ID-based user authentication scheme to solve the above mentioned problems. The proposed scheme provides anonymity and security for the user who accesses different cloud servers. Compared with the related schemes, the proposed scheme has less computation cost so it is very efficient for cloud computing in practice.
Keywords:Anonymity  cloud computing  identity-based scheme  user authentication  user identity.
本文献已被 维普 等数据库收录!
点击此处可从《电子科技学刊:英文版》浏览原始摘要信息
点击此处可从《电子科技学刊:英文版》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号