Networks - I: Secure user authentication in cloud computing
Abstract/Description
Cloud the industrial blockbuster of the era providing a list of benefits but suffering many problems with the rapid increase of clients, using different policies. With the passage of time many question arises on the security and performance of cloud, many issues originate because weak authentication process of the cloud servers and credentials openly travel in public internet which causes the breech in authentication process. Many new authentication schemes made and vary time to time to overcome the loop holes. This work suggests the model for hiding the authentication credentials travel on public internet.
Location
Room M1
Session Theme
Networks - I
Session Type
Other
Session Chair
Dr. Sayeed Ghani
Start Date
15-12-2013 1:30 PM
End Date
15-12-2013 2:00 PM
Recommended Citation
Javaid, Z., & Ijaz, I. (2013). Networks - I: Secure user authentication in cloud computing. International Conference on Information and Communication Technologies. Retrieved from https://ir.iba.edu.pk/icict/2013/2013/32
COinS
Networks - I: Secure user authentication in cloud computing
Room M1
Cloud the industrial blockbuster of the era providing a list of benefits but suffering many problems with the rapid increase of clients, using different policies. With the passage of time many question arises on the security and performance of cloud, many issues originate because weak authentication process of the cloud servers and credentials openly travel in public internet which causes the breech in authentication process. Many new authentication schemes made and vary time to time to overcome the loop holes. This work suggests the model for hiding the authentication credentials travel on public internet.