Conference Paper

A Practical Privacy preserving Password authentication Scheme for Cloud Computing

Authors:
To read the full-text of this research, you can request a copy directly from the author.

Abstract

An era of cloud computing allows users to profit from many privileges. However, there are several new security challenges. In fact, anonymous password authentication in the traditional setting has been suffered from many inherent drawbacks such as ease of exposure to malicious attacks and users registered their passwords in the server. Our scheme proposes the phenomenal context according to three main components: data owner, users, and service provider in cloud where users do not need to register their passwords in the service provider. Moreover, the data owner is contributed to make secure decisions; so that he manages the significant keys to other components distributedly. The proposal enjoys several advantages such as preserving privacy of password, unlinkability and secrecy of session key. We have given a mechanism to prove the identity of the users authenticated without a need to reveal their passwords. Our approach has been achieved good results of reliability, and validity for cloud password authentication. The experimental results show an effective level of performance

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

Article
Full-text available
The security of cloud computing is the most important concerns that may delay its well-known adoption. Authentication is the central part of cloud security, targeting to gain valid users for accessing to stored data in cloud computing. There are several authentication schemes that based on username/password, but they are considered weak methods of cloud authentication. In the other side, image's digitization becomes highly vulnerable to malicious attacks over cloud computing. Our proposed scheme focuses on two-factor authentication that used image partial encryption to overcome above aforementioned issues and drawbacks of authentication schemes. Additionally, we use a fast partial image encryption scheme using Canny's edge detection with symmetric encryption is done as a second factor. In this scheme, the edge pixels of image are encrypted using the stream cipher as it holds most of the image's data and then we applied this way to authenticate valid users. The results of security analysis and experimental results view that our work supports a good balance between security and performance for image encryption in cloud computing environment.
Article
Full-text available
Cloud Computing is the emerging and prominent technology in IT world. Rather than setting up, the infrastructure, platform and services separately for each and every IT industry, are kept collaboratively, which can be accessed by numerous users, in turn reduces the cost of setup and maintenance. Numerous organizations access the services, use the infrastructure and platform from the communal data centre's that may lie beyond the reach of the organization. Accessing the data from these data centre's necessitates secure communication. While adopting the Cloud Computing Environment, security issues are the major concern for IT industries. Moreover, authentication is required to validate the Client to the Service Broker. In this paper, we have proposed Third Party Authentication, which registers the new clients as well as authenticates the already registered clients. This paper also aims to add a new functionality at the end of Service Broker. For Service Management, we proposed Multi Client broadcast Service (MCBS), by which the Service Broker multicasts and schedule the services, in response to the same kind of service requests sent by multiple clients , under the consideration of various parameters, including network delay, bandwidth available and number of hops between client and Service Broker, service request size and cost. MCBS is integrated with service scheduling based on Round Robin, Priority scheduling.
ResearchGate has not been able to resolve any references for this publication.