Mutual Authentication in Cloud Computing - A Review

International Journal of Computer Trends and Technology (IJCTT)          
© 2016 by IJCTT Journal
Volume-34 Number-1
Year of Publication : 2016
Authors : Harpreet Kaur, Usvir Kaur
DOI :  10.14445/22312803/IJCTT-V34P110


Harpreet Kaur, Usvir Kaur "Mutual Authentication in Cloud Computing - A Review". International Journal of Computer Trends and Technology (IJCTT) V34(1):59-62, April 2016. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
Cloud computing nowadays has been involved in everyone’s life. This emerging technology allows users to share its resources globally. Cloud computing is aimed at providing IT as a service to the cloud users on-demand basis with greater flexibility, availability, reliability and scalability with utility computing model. Among all researching areas of cloud computing, mutual authentication is one of the popular areas for researchers whose main task is to attain a secure mutual authenticated environment by using various approaches. This paper discussed various types of mutual authentication techniques.

[1] V.K.Zadirakaa and A.M.Kudina “Cloud Computing in Cryptography and Steganography” Cybernetics and Systems Analysis, Springer, pp. 584-588, 2013.
[2] Nimmy K., M.Sethumadhavan “Novel Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography”, ICADIWT (Applications of digital information and web Technologies), IEEEfifth international conference pp.101-106, 2014.
[3] Mrudula Sarvabhatla, M.Giri, Chandra Sekhar Vorugunti “A Secure Mutual Authentication protocol for Cloud Computing using Secret Sharing and steganography”, Cloud Computing in Emerging markets(CCEM) , IEEE, pp.1-8, 2014.
[4] G Yang, DS Wong, H Wang, X Deng” Two-factor mutual authentication based on smart cards and passwords”, journal of Computer and System Sciences , vol.74(7), pp.1160-1172, 2008
[5] Tien-Ho Chen, Hsiu-lien Yeh, Wei-kuan Shih “An Advanced ECC Dynamic ID-Based Remote Mutual Authentication Scheme for Cloud Computing” IEEE conf. on Multimedia and Ubiquitous Engineering, 2011.
[7] U.Somani, K.Lakhani; M.Mundra “implementing digital signature with RSA encryption algorithm to enhance the Data Security of Cloud in Cloud Computing” PDGC (parallel distributed and grid computing), pp. 211-216, 2010.
[8] M.K.Ibrahem “Modification of Diffie-Hellman key exchange algorithm for Zero knowledge proof”, future Communication Networks (ICFCN), pp.147-152, 2012.
[9] F.F.Maghaddam, S.G.Moghaddam, S.Rouzbeh “A Scalable and Efficient user Authentication Scheme for Cloud Computing Environments”, IEEE, 2014.
[10] Te-Shun Chou “Security threats on cloud computing vulnerabilities”, IJCSIT (International journal of computer science and information technology), vol5, pp.78-88, June 2013.

Cloud computing, Mutual Authentication, Encryption, Steganography.