A New Framework of Authentication Over Cloud Computing

  • Megouache LeilaEmail author
  • Zitouni Abdelhafid
  • Djoudi Mahieddine
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 661)


The growth of local data annually implies extra charges for the customers, which makes their business slowing down. Cloud computing paradigm comes with new technologies that offer a very economic and cost-effective solution, but the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud and it is highly crucial to protect the sensitive data and systems in the cloud setting in order to ensure the privacy of its users. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view.


Cloud computing Security Authentication 


  1. 1.
    Baruah, K.C.H., Banerjee, S., Dutta, M.P., Bhunia, C.T.: An improved biometric-based multi server authentication scheme using smart card. Int. J. Secur. Appl. 9(1), 397–408 (2015)Google Scholar
  2. 2.
    Clement, T.: The security in the cloud computing. Presented in CQSI, October 2012Google Scholar
  3. 3.
    Nithiavathy, R.: Data Integrity and Data Dynamics with Secure Storage Service in Cloud, Proceedings (2013)Google Scholar
  4. 4.
    Banerjee, S., Dutta, M.P., Bhunia, C.T.: An improved smart card based anonymous multi-server remote user authentication scheme. Int. J. Smart Home 9(5), 11–22 (2015)CrossRefGoogle Scholar
  5. 5.
    Kumbhare, A., Simmhan, P., Prasanna, V.: Cryptonite: a secure and performant data. In: IEEE 5th International Conference on Cloud Computing (CLOUD), pp. 510–519. IEEE (2016)Google Scholar
  6. 6.
    Huang, H., Liu, K.: Efficient key management for preserving HIPAA regulations. J. Syst. Softw. 84, 122–221 (2015)Google Scholar
  7. 7.
    El Makkaoui, K., Ezzati, A., Beni-Hssane, A., Motamed, C.: Data confidentiality in the word of cloud. J. Theor. Appl. Inf. Technol. 84(3) (2016) Google Scholar
  8. 8.
    Pippal, R.S., Wu, S.: Robust smart card authentication scheme for multi-server architecture. Wirel. Pers. Commun. 72(1), 729–745 (2013)CrossRefGoogle Scholar
  9. 9.
    Idrissi, H.K., Kartit, A., El Marraki, M.: A taxonomy and survey of cloud computing. Presented at the Security Days (JNS3), pp. 1–5 (2013)Google Scholar
  10. 10.
    Merkle, R.C.: A certified digital signature. In: Proceedings of 9th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO 1989, Santa Barbara, California, USA, vol. 435, pp. 218–238 (1989)Google Scholar
  11. 11.
    Sirohi, P., Agarwal, A.: Cloud computing data storage security framework relating to data integrity, privacy and trust, pp. 4–5 (2015)Google Scholar
  12. 12.
    Sun, X., Qu, S., Zhu, X., Zhang, M., Ren, Z., Yang, C.: Cloud storage architecture achieving privacy protection and sharing. Appl. Math. Inf. Sci. 9(3), 1639–1644 (2015)Google Scholar
  13. 13.
    Deyan, D.C., Zhao, H.: Data security and privacy protection issues in CC. In: IEEE International Conference on Computer Science and Electronics Engineering (ICCSEE) (2015)Google Scholar
  14. 14.
    Petit, A., Ben Mokhtar, L.B., Kosch, H.: Towards efficient and accurate privacy preserving web search. In: MW4NG 2014, Bordeaux, France, 8–12 December (2014)Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  • Megouache Leila
    • 1
    Email author
  • Zitouni Abdelhafid
    • 1
  • Djoudi Mahieddine
    • 2
  1. 1.Lire LabsAbdelhamid Mehri Constantine 2 UniversityConstanineAlgeria
  2. 2.TECHNE LabsUniversity of PoitiersPoitiers Cedex 9France

Personalised recommendations