Abstract
Cloud computing has emerged as a new field of IT industry as it has made many changes in the computing environment by acceleration of communications environment and the rapid spread of mobile devices recently. Many IT companies are providing various types of cloud services and have switched a variety of services that the companies have into the cloud service. However, Cloud computing has a slow growth rate and technology development related fields are being behind due to several security vulnerabilities that cloud computing has. In this paper, we analyze the vulnerabilities of the security element that cloud computing has and propose an authentication technique suited to cloud computing. PDM performs the self-authentication of many computing devices after receiving authentication from the authentication agency in the proposed authentication technique. The safety and efficiency of the device authentication can be increased in this way.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bhosle, P.I., Kasurkar, S.A.: Trust in cloud computing. Int. J. Adva. Res. Comput. Eng. Technol. (IJARCET) 2(4), 1541–1548 (2013)
Mahajan, P., Setty, S., Lee, S., Clement, A., Alvisi, L., Dahlin, M., Walfish, M.: Depot: cloud storage with minimal trust. ACM Trans. Comput. Syst. 29(4), 12 (2011)
Armbrust, M., et al.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)
Jansen, W., Grance, T.: Guidelines on Security and Privacy in Public Cloud Computing, pp. 800–144. Technical Report Special Publication, NIST (2011)
Jeong, M.S., Lee, D.B.: Analysis of security threats and security requirements in smartwork. J. Korea Inst. Inform. Secur. Cryptol. 23(3), 30–37 (2011)
Shaikh, R., Sasikumar, M.: Trust framework for calculating security strength of a cloud service. IEEE Int. Conf. Commun. Inform. Comput. Technol. (ICCICT) (2012)
Banirostam, H., Hedayati, A., Khadem Zadeh, A., Shamsinezhad, E.: A trust based approach for increasing security in cloud computing infrastructure. In: 15th International Conference on Computer Modelling and Simulation (2013)
Ahmed, M., Xiang, Y., Ali, S.: Above the trust and security in cloud computing: a notion towards innovation. In: IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Australia (2010)
Li, T., Lin, C., Ni, Y.: Evaluation of user behavior trust in cloud computing. In: International Conference on Computer Application and System Modeling-ICCASM, China (2010)
Acknowledgements
This is paper was supported by Joongbu University Research and Development Fund, in 2020.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Yang, HS. (2021). A Study on Improved Authentication Technique in Cloud Computing. In: Lee, R., Kim, J.B. (eds) Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing. SNPD 2021. Studies in Computational Intelligence, vol 951. Springer, Cham. https://doi.org/10.1007/978-3-030-67008-5_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-67008-5_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-67007-8
Online ISBN: 978-3-030-67008-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)