2017 International Conference on I-Smac (IoT in Social, Mobile, Analytics and Cloud) (I-Smac) 2017
DOI: 10.1109/i-smac.2017.8058300
|View full text |Cite
|
Sign up to set email alerts
|

AES and MD5 based secure authentication in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…As presented in [6], on the basis of trust between users and providers, to prevent a man-in-themiddle attack, encryption and decryption were used to safeguard user login by storing encrypted login IDs and passwords in the database. The user thumb impression was applied to authenticate user in case of password theft.…”
Section: Related Workmentioning
confidence: 99%
“…As presented in [6], on the basis of trust between users and providers, to prevent a man-in-themiddle attack, encryption and decryption were used to safeguard user login by storing encrypted login IDs and passwords in the database. The user thumb impression was applied to authenticate user in case of password theft.…”
Section: Related Workmentioning
confidence: 99%
“…The passphrase in the proposed scheme ensures secure passwords and provides extra security for the SSH key pair. In [66], the authors proposed an authentication-based AES and MD5 technique for data encryption to protect the data and the login of the users over the cloud at the time of login.…”
Section: Solutions At Application Levelmentioning
confidence: 99%
“…Paper Year Research Result [9] 2015 Secure and resolve data security problem on cloud computing by AES [20] 2019 Secure data and reduce traffic time by AES encryption [21] 2018 Heterogeneous model on cloud computing is able to give data security contribution [22] 2019 Big volumes of private data are collected and need to be secured in cloud [23] 2019 Security modeling on cloud computing to prevent data theft [24] 2019 Symmetric encryption scheme is implemented in client before data is uploaded to cloud computing [25] 2017 Usages of authentication and cryptographic for future security on cloud computing operating system [26] 2015 Data security problem in distributed data system proposing SHA-1 algorithm to secure data…”
Section: Previous Studies Of Aes Encryption On Cloud Computingmentioning
confidence: 99%