Cloud Computing Security with Identity-Based Authentication Using Heritage-Based Technique
Journal: International Journal of Advanced Engineering Research and Science (Vol.4, No. 5)Publication Date: 2017-05-08
Authors : Rishi Kumar Sharma; R.K.Kapoor;
Page : 220-227
Keywords : cloud computing; cloud heritage; security; authentication.;
Abstract
More organizations start to give various types of distributed computing administrations for Internet clients in the meantime these administrations additionally bring some security issues. Presently the many of cloud computing systems endow digital identity for clients to access their services, this will bring some drawback for a hybrid cloud that includes multiple private clouds and/or public clouds. Today most cloud computing framework use asymmetric and traditional public key cryptography to give information security and common authentication. Identity-based cryptography has some attraction attributes that appear to fit well the necessities of cloud computing. In this paper, by receiving federated identity management together with hierarchical identity-based cryptography (HIBC) with cloud heritage technique, not only the key distribution but also the mutual validation can be rearranged in the cloud.
Other Latest Articles
- Employees' Emotional Intelligence Determinants in Handling Dengue Fever (Case Study: Jember Regency, East Java Province, Indonesia)
- Charge Discreteness as Model in Charge Migration in a Chain of DNA Molecules under Radiation
- Super complete-antimagicness of Amalgamation of any Graph
- A Review of Aggregate and Asphalt mixture Specific Gravity measurements and their Impacts on Asphalt Mix Design Properties and Mix Acceptance
- The 3rd All-Russian Scientific Conference on “The Dynamics of Modern Ecosystems in the Holocene”
Last modified: 2017-06-04 02:31:27