Networks - I: Secure user authentication in cloud computing

Abstract/Description

Cloud the industrial blockbuster of the era providing a list of benefits but suffering many problems with the rapid increase of clients, using different policies. With the passage of time many question arises on the security and performance of cloud, many issues originate because weak authentication process of the cloud servers and credentials openly travel in public internet which causes the breech in authentication process. Many new authentication schemes made and vary time to time to overcome the loop holes. This work suggests the model for hiding the authentication credentials travel on public internet.

Location

Room M1

Session Theme

Networks - I

Session Type

Other

Session Chair

Dr. Sayeed Ghani

Start Date

15-12-2013 1:30 PM

End Date

15-12-2013 2:00 PM

Share

COinS
 
Dec 15th, 1:30 PM Dec 15th, 2:00 PM

Networks - I: Secure user authentication in cloud computing

Room M1

Cloud the industrial blockbuster of the era providing a list of benefits but suffering many problems with the rapid increase of clients, using different policies. With the passage of time many question arises on the security and performance of cloud, many issues originate because weak authentication process of the cloud servers and credentials openly travel in public internet which causes the breech in authentication process. Many new authentication schemes made and vary time to time to overcome the loop holes. This work suggests the model for hiding the authentication credentials travel on public internet.