Abstract
Cloud computing is known as one of the big next things in Information Communication Technology world. Cloud computing offers a lot of cost and efficiency benefits to the business, but it also introduce significant security vulnerabilities. Data security always becomes a big concern whenever customers lose physical control on their data. Sensitive data processed outside the enterprise need to be assurance that they are only accessible and propagate to the privileged users. In this paper, we proposed a mutual authentication that allow cloud user and cloud remote server to authenticate each other as we believed it is crucial to protect not only the server but also the legitimate users from security threats. Unlike one way authentication, in mutual authentication, client must proves its identity to server and the server must proves its identity to client before any access have been granted or any application traffic is sent over the client–server connection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Geelan J (2009) Twenty one experts define cloud computing virtualization: electronic magazine. http://virtualization.sys-con.com/node/612375
CloudImpact: cloud computing the stormy side/the upside. http://blogcloudimpact.com/?p=78
Duncan D, Chu X, Vecchiola C, Buyya R (2009) The structure of the new IT frontier: cloud computing-part 1. Strategic facilities magazine. Pacific & Strategic Holdings Pte Ltd, Singapore, Issue 9, pp 67–72
Gens F (2009) New IDC IT cloud services survey: top benefits and challenges in cloud computing. http://blogs.idc.com/ie/?p=730
Lee S, ong I, Lim HT, Lee HJ (2010) Two factor authentication for cloud computing. Int J Korea Inst Marit Inf Commun Sci (KIMICS) 8(4):427–432
Chou D (2008) Strong user authentication on web: Microsoft the architecture-journal. http://msdn.microsoft.com/enus/library/cc838351.aspx
Deloitte (2011) Information security briefing cloud computing. http://www.cpni.gov.uk/Documents/Publications/2010/2010007-ISB_cloud_computing.pdf
Gregg M (2010) 10 Security concerns for cloud computing. http://www.globalknowledge.ae/knowledge%20centre/white%20papers/virtualisation%20white%20papers/10%20security%20concerns%20for%20cloud.aspx
Kher V, Kim Y (2005) Securing distributed storage: challenges, techniques, and systems. In: Proceedings of the 2005 ACM workshop on storage security and survivability, pp 9–24
Acknowledgments
This work was supported in part by the Dongseo Frontier 2009 and was supported by a research program of Dongseo University’s Ubiquitous Appliance Regional Innovation Center supported by the grants from Ministry of Knowledge Economy of the Korean government and Busan Metropolitan City(No. B0008352).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Lee, S., Kim, T.Y., Lee, HJ. (2013). Mutual Authentication Scheme for Cloud Computing. In: Jung, HK., Kim, J., Sahama, T., Yang, CH. (eds) Future Information Communication Technology and Applications. Lecture Notes in Electrical Engineering, vol 235. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6516-0_17
Download citation
DOI: https://doi.org/10.1007/978-94-007-6516-0_17
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-6515-3
Online ISBN: 978-94-007-6516-0
eBook Packages: EngineeringEngineering (R0)