Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 4
Page No. 1189 - 1197

Enhanced TPUA Mechanism with Data Protection Using ID in Cloud Computing

Authors : K. Sujatha and V. Ceronmani Sharmila

References

Ahmed, M.A., D.R. Lakshmi and S.S. Sattar, 2009. Cryptanalysis of a more efficient and secure dynamic ID-based remote user authentication scheme. Intl. J. Netw. Secur. Appl., 1: 32-37.

An, Y.H., 2015. Security enhancements of smart card-based remote user password authentication scheme with session key agreement. Proceedings of the 2015 17th International Conference on Advanced Communication Technology (ICACT), July 1-3, 2015, IEEE, Seoul, South Korea, ISBN:978-89-968650-4-9, pp: 669-674.

Carolan, J., S. Gaede, J. Baty, G. Brunette and A. Licht et al., 2009. Introduction to Cloud Computing Architecture. 1st Edn., Micro Systems Inc, ‎Menlo Park, California‎, USA.,.

Chen, P.L., J.H. Yang and C.I. Lin, 2013. ID-Based user authentication scheme for cloud computing. J. Electron. Sci. Technol., 11: 221-224.
Direct Link  |  

Choudhury, A.J., P. Kumar, M. Sain, H. Lim and H. Jae-Lee, 2011. A strong user authentication framework for cloud computing. Proceedings of the 2011 IEEE International Conference on Asia-Pacific Services Computing (APSCC), December 12-15, 2011, IEEE, Jeju Island, South Korea, ISBN:978-1-4673-0206-7, pp: 110-115.

Chueh, J.S. and M.T. Sun, 2017. Design and implementation of security system for cloud storage. Proceedings of the 2017 19th International Symposium on Asia-Pacific Network Operations and Management (APNOMS), September 27-29, 2017, IEEE, Seoul, South Korea, ISBN:978-1-5386-1102-9, pp: 129-134.

Das, M.L., A. Saxena and V.P. Gulati, 2004. A dynamic id-based remote user authentication scheme. IEEE Trans. Consumer Elect., 50: 629-631.
CrossRef  |  

Hajivali, M., F.F. Moghaddam, M.T. Alrashdan and A.Z. Alothmani, 2013. Applying an agent-based user authentication and access control model for cloud servers. Proceedings of the 2013 International Conference on ICT Convergence (ICTC), October 14-16, 2013, IEEE, Jeju, South Korea, ISBN:978-1-4799-0698-7, pp: 807-812.

Hsiang, H.C. and W.K. Shih, 2009. Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interf., 31: 1118-1123.
Direct Link  |  

Khan, M.K., S.K. Kim and K. Alghathbar, 2011. Cryptanalysis and security enhancement of a more efficient and secure dynamic ID-based remote user authentication scheme. Comput. Commun., 34: 305-309.
Direct Link  |  

Lee, H., D. Choi, Y. Lee, D. Won and S. Kim, 2009. Security weaknesses of dynamic ID-based remote user authentication protocol. Proce. World Acad. Sci. Eng. Technol., 59: 190-193.
Direct Link  |  

Lee, S., I. Ong, H.T. Lim and H.J. Lee, 2010. Two factor authentication for cloud computing. J. Inf. Commun. Conver. Eng., 8: 427-432.
CrossRef  |  Direct Link  |  

Liao, I.E., C.C. Lee and M.S. Hwang, 2006. A password authentication scheme over insecure networks. J. Comput. Syst. Sci., 72: 727-740.
CrossRef  |  Direct Link  |  

Menkus, B., 1988. Understanding the use of passwords. Comput. Secur., 7: 132-136.
Direct Link  |  

Mo, J., Z. Hu and Y. Lin, 2016. A user authentication scheme based on trusted platform for cloud computing. Proceedings of the International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, November 16-18, 2016, Springer, Cham, ISBN:978-3-319-49147-9, pp: 122-130.

Moghaddam, F.F., S.G. Moghaddam, S. Rouzbeh, S.K. Araghi and N.M. Alibeigi et al., 2014. A scalable and efficient user authentication scheme for cloud computing environments. Proceedings of the 2014 IEEE International Symposium on Region 10, April 14-16, 2014, IEEE, Kuala Lumpur, Malaysia, ISBN:978-1-4799-2027-3, pp: 508-513.

Ramgovind, S., M.M. Eloff and E. Smith, 2010. The management of security in Cloud computing. Proceedings of the Information Security for South Africa, August 2-4, 2010, Sandton, Johannesburg, pp: 1-7.

Yang, G., D.S. Wong, H. Wang and X. Deng, 2008. Two-factor mutual authentication based on smart cards and passwords. J. Comput. Syst. Sci., 74: 1160-1172.
CrossRef  |  Direct Link  |  

Yang, J.H., Y.F. Chang and C.C. Huang, 2013. A user authentication scheme on multi-server environments for cloud computing. Proceedings of the 2013 9th International Conference on Information, Communications and Signal Processing (ICICS), December 10-13, 2013, IEEE, Tainan, Taiwan, ISBN:978-1-4799-0434-1, pp: 1-4.

Yu, Y., M.H. Au, G. Ateniese, X. Huang and W. Susilo et al., 2017. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE. Trans. Inf. Forens. Secur., 12: 767-778.
CrossRef  |  Direct Link  |  

Zhang, M. and Y. Zhang, 2015. Certificateless anonymous user authentication protocol for cloud computing. Proceedings of the 2015 International Conference on Intelligent Transportation, Big Data and Smart City (ICITBS), December 19-20, 2015, IEEE, Halong Bay, Vietnam, ISBN:978-1-5090-0464-5, pp: 200-203.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved