2016
DOI: 10.1002/cpe.3864
|View full text |Cite
|
Sign up to set email alerts
|

A new secure authentication scheme for cloud computing environment

Abstract: SUMMARYCloud computing is an emerging computing area that allows on-demand, scalable, flexible, and low-cost services to the users. In cloud computing, access control and security are two major problems. In this paper, a novel authentication scheme using Chebyshev chaotic maps has been presented. The proposed model satisfies many security factors, such as scalability of login, mutual authentication, freedom of password change, two-factor security, and forward security. Two-factor security is a method that requ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
15
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 47 publications
0
15
0
Order By: Relevance
“…There are many existing searchable encryption schemes . One of the main disadvantages of these schemes is that they require complex cryptographic operations . In cloud computing, users perform complex cryptographic operations for each data, so the CSP is unable to provide the cloud services to all the users.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…There are many existing searchable encryption schemes . One of the main disadvantages of these schemes is that they require complex cryptographic operations . In cloud computing, users perform complex cryptographic operations for each data, so the CSP is unable to provide the cloud services to all the users.…”
Section: Introductionmentioning
confidence: 99%
“…18,19 One of the main disadvantages of these schemes is that they require complex cryptographic operations. 20 In cloud computing, users perform complex cryptographic operations for each data, so the CSP is unable to provide the cloud services to all the users. The situation becomes more critical when many users request for the same data or file.…”
mentioning
confidence: 99%
“…It is classified as user authentication, remote authentication, mutual authentication, message authentication, and implicit authentication [11,12]. The current authentication review shows the different attributes, based on password, hash value, identity, digital signature, hierarchical model, mobile number, group key, and biometric [13].…”
Section: Introductionmentioning
confidence: 99%
“…Smart card based or the trusted third party based authentications are the most common technique to prevent illegal access in an insecure mobile cloud environment [6]. Many authentication protocols proposed [13,18,[24][25][26][27] to verify the originality of end user. However, most of these protocols may not be satisfying the security against a phishing attack.…”
Section: Introductionmentioning
confidence: 99%
“…The topics covered in this special issue include Cloud Computing , Parallel and Distributed Processing , Scheduling of Resources , and other applications in High‐Performance Computing for Natural Computation and Knowledge Discovery , It is hoped that this CCPE issue will make a good reference material and be of great use for readers in Computer Science, System Engineering, Mathematics, and Artificial Intelligence, etc.…”
mentioning
confidence: 99%