ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Cloud Computing Security with Identity-Based Authentication Using Heritage-Based Technique

Journal: International Journal of Advanced Engineering Research and Science (Vol.4, No. 5)

Publication Date:

Authors : ; ;

Page : 220-227

Keywords : cloud computing; cloud heritage; security; authentication.;

Source : Downloadexternal Find it from : Google Scholarexternal


More organizations start to give various types of distributed computing administrations for Internet clients in the meantime these administrations additionally bring some security issues. Presently the many of cloud computing systems endow digital identity for clients to access their services, this will bring some drawback for a hybrid cloud that includes multiple private clouds and/or public clouds. Today most cloud computing framework use asymmetric and traditional public key cryptography to give information security and common authentication. Identity-based cryptography has some attraction attributes that appear to fit well the necessities of cloud computing. In this paper, by receiving federated identity management together with hierarchical identity-based cryptography (HIBC) with cloud heritage technique, not only the key distribution but also the mutual validation can be rearranged in the cloud.

Last modified: 2017-06-04 02:31:27