We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

An Improved Mutual Authentication Framework for Cloud Computing

by Sanjeet Kumar Nayak, Subasish Mohapatra, Banshidhar Majhi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 52 - Number 5
Year of Publication: 2012
Authors: Sanjeet Kumar Nayak, Subasish Mohapatra, Banshidhar Majhi
10.5120/8201-1594

Sanjeet Kumar Nayak, Subasish Mohapatra, Banshidhar Majhi . An Improved Mutual Authentication Framework for Cloud Computing. International Journal of Computer Applications. 52, 5 ( August 2012), 36-41. DOI=10.5120/8201-1594

@article{ 10.5120/8201-1594,
author = { Sanjeet Kumar Nayak, Subasish Mohapatra, Banshidhar Majhi },
title = { An Improved Mutual Authentication Framework for Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { August 2012 },
volume = { 52 },
number = { 5 },
month = { August },
year = { 2012 },
issn = { 0975-8887 },
pages = { 36-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume52/number5/8201-1594/ },
doi = { 10.5120/8201-1594 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:51:31.125987+05:30
%A Sanjeet Kumar Nayak
%A Subasish Mohapatra
%A Banshidhar Majhi
%T An Improved Mutual Authentication Framework for Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 52
%N 5
%P 36-41
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, wehave propose a user authentication scheme for cloud computing. The proposed framework providesmutual authentication and session key agreement in cloud computing environment. The scheme executesin three phases such as server initialization phase, registration phase, authentication phase. Detailed security analyses have been made to validate the efficiency of the scheme. Further, the scheme has the resistance to possible attacks in cloud computing.

References
  1. Morsy M. A. , GrundyJ. and Muller I. , "An Analysis of The Cloud Computing Security Problem", In Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30th Nov 2010.
  2. Mell P. and Grance T. , "The NIST Definition of Cloud Computing", vol 53, issue 6, 2009.
  3. Choudhury A. J. , Kumar P. , Sain M. ,Hyotaek L. andHoon J. , "A Strong User Authentication Framework for Cloud Computing", Services Computing Conference (APSCC), 2011 IEEE Asia-Pacific,2011.
  4. BlumenthalM. S. , "Hide and Seek in the Cloud", Security & Privacy, IEEE, vol 8, pp. 57-58, 2010.
  5. Eren U. , Yates D. J. , "Enterprise fraudmanagement using cloud computing: A cost-benefit analysis framework",18th european conference on information systems, 2008.
  6. Almulla S. A. , Yeun C. Y. , "Cloud Computing Security Management", Engineering Systems Management and Its Applications (ICESMA), Second International Conference, 2010.
  7. Prasadreddy P. , Rao T. andVenkat S. , "A Threat Free Architecture forPrivacy Assurance in Cloud Computing" , 2011 IEEE World Congress on Services (SERVICES),2011.
  8. Cheikhrouhou O. ,Koubaa A. , Boujelben M. andAbid M. , "A lightweight user authentication scheme for Wireless Sensor networks", IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), 2010.
  9. Cid C. , "Recent developments in cryptographic hash functions: Security implications and future directions",Information Security Technical Report, vol. 11, no. 2, pp. 100 – 107, 2006.
  10. "National institute of standards and technology (nist), advanced encryption standard (aes)", Federal Information Processing Standards Publications (FIPS PUBS) 197, 2001.
  11. Sonasinky B. , "Cloud Computing", Wiley india Pvt. Ltd, ISBN:978-81-265-2980-3.
  12. ForouzanB. A. ,"Cryptography & Network Security", Tata Mc. Graw-Hill, ISBN:978-0-07-066046-5.
  13. YasminR. , RitterE, WangG. ,"An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures", 10th IEEE International Conference on Computer and Information Technology, 2010.
  14. Reddy B. et. Al. , "Cloud computing security issues and challenges", 2009.
  15. Lamport L. , "Password authentication with insecure communication," Communications of the ACM, vol. 24, issue 11, Nov 1981.
  16. Hwang M. S. , and Li L H. , "A New Remote User Authentication Scheme using Smart Cards", IEEE Transactions on Consumer Electronics, vol. 46, issue 1, 2000.
  17. ChienH. Y. , JanJ. K. , TsengY. M. , "An efficient and practical solution to remote authentication: Smart card," Computer Security, vol. 21, issue 4, 2002.
  18. LiaoI-En. , LeeCheng-Chi. , HwangMin- Shiang. , "A password authentication scheme over insecure networks," Journalof Computer System Science, vol 72, issue 4, 2006
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Double Authentication Password change Mutual Authentication Session key agreement