Skip to main content

Mutual Authentication Scheme for Cloud Computing

  • Chapter
  • First Online:
Future Information Communication Technology and Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 235))

Abstract

Cloud computing is known as one of the big next things in Information Communication Technology world. Cloud computing offers a lot of cost and efficiency benefits to the business, but it also introduce significant security vulnerabilities. Data security always becomes a big concern whenever customers lose physical control on their data. Sensitive data processed outside the enterprise need to be assurance that they are only accessible and propagate to the privileged users. In this paper, we proposed a mutual authentication that allow cloud user and cloud remote server to authenticate each other as we believed it is crucial to protect not only the server but also the legitimate users from security threats. Unlike one way authentication, in mutual authentication, client must proves its identity to server and the server must proves its identity to client before any access have been granted or any application traffic is sent over the client–server connection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Geelan J (2009) Twenty one experts define cloud computing virtualization: electronic magazine. http://virtualization.sys-con.com/node/612375

  2. CloudImpact: cloud computing the stormy side/the upside. http://blogcloudimpact.com/?p=78

  3. Duncan D, Chu X, Vecchiola C, Buyya R (2009) The structure of the new IT frontier: cloud computing-part 1. Strategic facilities magazine. Pacific & Strategic Holdings Pte Ltd, Singapore, Issue 9, pp 67–72

    Google Scholar 

  4. Gens F (2009) New IDC IT cloud services survey: top benefits and challenges in cloud computing. http://blogs.idc.com/ie/?p=730

  5. Lee S, ong I, Lim HT, Lee HJ (2010) Two factor authentication for cloud computing. Int J Korea Inst Marit Inf Commun Sci (KIMICS) 8(4):427–432

    Google Scholar 

  6. Chou D (2008) Strong user authentication on web: Microsoft the architecture-journal. http://msdn.microsoft.com/enus/library/cc838351.aspx

  7. Deloitte (2011) Information security briefing cloud computing. http://www.cpni.gov.uk/Documents/Publications/2010/2010007-ISB_cloud_computing.pdf

  8. Gregg M (2010) 10 Security concerns for cloud computing. http://www.globalknowledge.ae/knowledge%20centre/white%20papers/virtualisation%20white%20papers/10%20security%20concerns%20for%20cloud.aspx

  9. Kher V, Kim Y (2005) Securing distributed storage: challenges, techniques, and systems. In: Proceedings of the 2005 ACM workshop on storage security and survivability, pp 9–24

    Google Scholar 

Download references

Acknowledgments

This work was supported in part by the Dongseo Frontier 2009 and was supported by a research program of Dongseo University’s Ubiquitous Appliance Regional Innovation Center supported by the grants from Ministry of Knowledge Economy of the Korean government and Busan Metropolitan City(No. B0008352).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tae Yong Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht

About this chapter

Cite this chapter

Lee, S., Kim, T.Y., Lee, HJ. (2013). Mutual Authentication Scheme for Cloud Computing. In: Jung, HK., Kim, J., Sahama, T., Yang, CH. (eds) Future Information Communication Technology and Applications. Lecture Notes in Electrical Engineering, vol 235. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6516-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-6516-0_17

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-6515-3

  • Online ISBN: 978-94-007-6516-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics