Abstract
Because cloud computing provides a computing power, a development environment, and storage spaces as much as user to want, the range of its use is increasingly expanded, and also service of cloud computing for mobile devices is increased. The existing education environment is being changed for smart learning environment using smart equipment and cloud computing. All information of users using cloud computing is stored in the cloud server. Thus, as users’ anxiety to use it is weighted, one of the most important things to consider is the security issues in cloud computing environments. Cloud computing requires authentication scheme to provide high quality security in order to securely keep date in the server. This study aims to propose secure authentication scheme of the smart learning system in the cloud computing environment. In this way, the authentication scheme allows user securely to have access to the smart learning system in the cloud environment.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Hyeonseung, K., Chunsik, P.: Cloud computing and personal authentication service. J. Korea Inst. Inf. Secur. Cryptol. 20(2), 11–19 (2010)
Roh, G.-S., Joo, S.-H., Jung, J.-T.: An exploratory study on concept and realization conditions of smart learning. J. Dig. Policy Manag. 9(2), 79–88 (2012)
Jeong, Y.-S., Lee, S.-H.: User authentication protocol through distributed process for cloud environment. J. Korea Inst. Inf. Secur. Cryptol. 22(4), 841–884 (2012)
Jeong, H.-Y., Kim, Y.-H.: A design of u-Learning’s teaching and learning model in the cloud computing environment. Korea Navig. Inst. (KONI) 13(5), 781–786 (2009)
Lee, S., Lim, T., Lee, H.J.: Two factor authentication for cloud computing. Int. J. KIMICS 8, 427–432 (2010)
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)
Bertino, E., Paci, F., Ferrini, R., Shang, N.: Privacy-preserving digital identity management for cloud computing. Bull. IEEE Comput. Soc. Tech. Comm. Data Eng. 32(1), 21–27 (2009)
Daemen, J., Rijmen, V.: The design of Rijndael: AES—the advanced encryption standard. Springer, Berlin (2002)
Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(12), 770–772 (1981)
Popovic, K., Hocenski, Z.: Cloud Computing security issues and challenges. In: The 3rd international conference on advances in human-oriented and personalized mechanisms, technologies, and services, pp. 344–349 (2010)
Meniya, A.D., Jethva, H.B.: Single-Sign-On (SSO) across open cloud computing federation. Int. J. Eng. Res. Appl. (IJERA) 2(1), 891–895 (2012)
Almutairi, A., Sarfraz, M., Basalamah, S.: A distributed access control architecture for cloud computing. IEEE Softw. 29, 36–44 (2012)
Author information
Authors and Affiliations
Corresponding author
Additional information
Special Issue: Convergence Security Systems.
Rights and permissions
About this article
Cite this article
Lee, A. Authentication scheme for smart learning system in the cloud computing environment. J Comput Virol Hack Tech 11, 149–155 (2015). https://doi.org/10.1007/s11416-015-0240-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11416-015-0240-4