Cloud computing is used to store information and supply computing services and resources to humans available all over the internet. Huge amount of data is being saved in data centers, which could therefore create chance for records leakage and get a right of entry to develop illegitimate customers...
He has published more than 70 referred journal papers in his research interests, which include cryptography, information security, cloud computing security etc. He is currently an Editor of Telecommunication Systems and KSII Transactions on Internet and In”-formation Systems. He has served on TPC ...
Cloud computing is an emerging approach in the field of distributed computing that provides web based services, computation and storage for the community(including business, healthcare and government). The customers are offered dynamically scalable resources and thus the cloud users are economically benef...
Our design is based on ID-based proxy signatures from pairings. The analysis shows that the proposed scheme can effectively strengthen the security through authentication in cloud computing. 展开 关键词: PROXY SIGNATURE PAIRINGS DOI: 10.1007/s10586-013-0262-y 被引量: 8 年份: 2013 ...
A cloud service can be deployed as either a project-level service or global service. For a project-level service, obtain a project-level token. When you call the API, set auth.scope in the request body to project. For a global service, obtain a global token. When you call the API, ...
In AK/SK authentication, AK/SK is used to sign requests and the signature is then added to the requests for authentication. AK: access key, which is a unique identifier used together with an SK to sign requests cryptographically. SK: secret access key, which is used together with an AK ...
Authentication and authorization methods for cloud computing security platformAn authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service ...
This study aims to propose secure authentication scheme of the smart learning system in the cloud computing environment. In this way, the authentication scheme allows user securely to have access to the smart learning system in the cloud environment....
As result, we proposed framework of IPTV service based on secure authentication mechanism and lightweight content encryption method for screen-migration in Cloud computing. We used cryptographic nonce combined with user ID and password to authenticate user device in any mobile terminal they passes by....
Microsoft Azure Authentication is a service provided by Microsoft Azure, the cloud computing platform of Microsoft. It is designed to provide secure access control and authentication for applications and services hosted on Azure. /ufmRestV2 N/A Kerberos Authentication Kerberos is a protocol designe...