Mutual Authentication Scheme for Cloud Computing

Chapter
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 235)

Abstract

Cloud computing is known as one of the big next things in Information Communication Technology world. Cloud computing offers a lot of cost and efficiency benefits to the business, but it also introduce significant security vulnerabilities. Data security always becomes a big concern whenever customers lose physical control on their data. Sensitive data processed outside the enterprise need to be assurance that they are only accessible and propagate to the privileged users. In this paper, we proposed a mutual authentication that allow cloud user and cloud remote server to authenticate each other as we believed it is crucial to protect not only the server but also the legitimate users from security threats. Unlike one way authentication, in mutual authentication, client must proves its identity to server and the server must proves its identity to client before any access have been granted or any application traffic is sent over the client–server connection.

Keywords

Cloud computing Mutual authentication Cloud data security Cloud authentication 

Notes

Acknowledgments

This work was supported in part by the Dongseo Frontier 2009 and was supported by a research program of Dongseo University’s Ubiquitous Appliance Regional Innovation Center supported by the grants from Ministry of Knowledge Economy of the Korean government and Busan Metropolitan City(No. B0008352).

References

  1. 1.
    Geelan J (2009) Twenty one experts define cloud computing virtualization: electronic magazine. http://virtualization.sys-con.com/node/612375
  2. 2.
    CloudImpact: cloud computing the stormy side/the upside. http://blogcloudimpact.com/?p=78
  3. 3.
    Duncan D, Chu X, Vecchiola C, Buyya R (2009) The structure of the new IT frontier: cloud computing-part 1. Strategic facilities magazine. Pacific & Strategic Holdings Pte Ltd, Singapore, Issue 9, pp 67–72Google Scholar
  4. 4.
    Gens F (2009) New IDC IT cloud services survey: top benefits and challenges in cloud computing. http://blogs.idc.com/ie/?p=730
  5. 5.
    Lee S, ong I, Lim HT, Lee HJ (2010) Two factor authentication for cloud computing. Int J Korea Inst Marit Inf Commun Sci (KIMICS) 8(4):427–432Google Scholar
  6. 6.
    Chou D (2008) Strong user authentication on web: Microsoft the architecture-journal. http://msdn.microsoft.com/enus/library/cc838351.aspx
  7. 7.
    Deloitte (2011) Information security briefing cloud computing. http://www.cpni.gov.uk/Documents/Publications/2010/2010007-ISB_cloud_computing.pdf
  8. 8.
  9. 9.
    Kher V, Kim Y (2005) Securing distributed storage: challenges, techniques, and systems. In: Proceedings of the 2005 ACM workshop on storage security and survivability, pp 9–24Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  1. 1.Intel Technology Sdn. BhdMalaysiaMalaysia
  2. 2.Division of Computer and Information EngineeringDongseo UniversityBusanKorea

Personalised recommendations