International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 34 | Number 1 | Year 2016 | Article Id. IJCTT-V34P110 | DOI : https://doi.org/10.14445/22312803/IJCTT-V34P110

Mutual Authentication in Cloud Computing - A Review


Harpreet Kaur, Usvir Kaur

Citation :

Harpreet Kaur, Usvir Kaur, "Mutual Authentication in Cloud Computing - A Review," International Journal of Computer Trends and Technology (IJCTT), vol. 34, no. 1, pp. 59-62, 2016. Crossref, https://doi.org/10.14445/22312803/ IJCTT-V34P110

Abstract

Cloud computing nowadays has been involved in everyone’s life. This emerging technology allows users to share its resources globally. Cloud computing is aimed at providing IT as a service to the cloud users on-demand basis with greater flexibility, availability, reliability and scalability with utility computing model. Among all researching areas of cloud computing, mutual authentication is one of the popular areas for researchers whose main task is to attain a secure mutual authenticated environment by using various approaches. This paper discussed various types of mutual authentication techniques.

Keywords

Cloud computing, Mutual Authentication, Encryption, Steganography.

References

[1] V.K.Zadirakaa and A.M.Kudina “Cloud Computing in Cryptography and Steganography” Cybernetics and Systems Analysis, Springer, pp. 584-588, 2013.
[2] Nimmy K., M.Sethumadhavan “Novel Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography”, ICADIWT (Applications of digital information and web Technologies), IEEEfifth international conference pp.101-106, 2014.
[3] Mrudula Sarvabhatla, M.Giri, Chandra Sekhar Vorugunti “A Secure Mutual Authentication protocol for Cloud Computing using Secret Sharing and steganography”, Cloud Computing in Emerging markets(CCEM) , IEEE, pp.1-8, 2014.
[4] G Yang, DS Wong, H Wang, X Deng” Two-factor mutual authentication based on smart cards and passwords”, journal of Computer and System Sciences , vol.74(7), pp.1160-1172, 2008
[5] Tien-Ho Chen, Hsiu-lien Yeh, Wei-kuan Shih “An Advanced ECC Dynamic ID-Based Remote Mutual Authentication Scheme for Cloud Computing” IEEE conf. on Multimedia and Ubiquitous Engineering, 2011.
[6] www.google.com
[7] U.Somani, K.Lakhani; M.Mundra “implementing digital signature with RSA encryption algorithm to enhance the Data Security of Cloud in Cloud Computing” PDGC (parallel distributed and grid computing), pp. 211-216, 2010.
[8] M.K.Ibrahem “Modification of Diffie-Hellman key exchange algorithm for Zero knowledge proof”, future Communication Networks (ICFCN), pp.147-152, 2012.
[9] F.F.Maghaddam, S.G.Moghaddam, S.Rouzbeh “A Scalable and Efficient user Authentication Scheme for Cloud Computing Environments”, IEEE, 2014.
[10] Te-Shun Chou “Security threats on cloud computing vulnerabilities”, IJCSIT (International journal of computer science and information technology), vol5, pp.78-88, June 2013.