An Authentication Mechanism to Enhance Security in the Cloud Environment

Authors

  • A. Cecil Donald Computer Science Department, St. Joseph’s College (Autonomous), Tiruchirappalli, India Author
  • A. Jenis Computer Science Department, St. Joseph’s College (Autonomous), Tiruchirappalli, India Author
  • L. Arockiam Computer Science Department, St. Joseph’s College (Autonomous), Tiruchirappalli, India Author

Keywords:

Authentication, Cloud Computing, Digital Signatures, Security, Trusted Authenticator (TA).

Abstract

Cloud is a term defined as a pool of configurable computing resources that can be accessed by users based on a pay-as-you-go principle. Cloud computing is otherwise termed as internet computing because of its availability and that will be feasible only with the internet connection. Therefore, security plays a major role in cloud computing. Some of the important security services including encryption, authentication, integrity and confidentiality. This paper analyses various existing authentication mechanism and their issues. An enhanced authentication mechanism for identifying user in cloud environment is also proposed. The mechanism authenticates the user to access the appropriate cloud services. There are three main components involved in this framework namely User, Trusted Authenticator (TA) and Cloud Service Providers (CSPs). The TA provides secure access to the user by generating the digital signature and credentials. In this paper, the steps for authenticating the users are also described.

References

Downloads

Published

2014-10-31

Issue

Section

Articles

How to Cite

An Authentication Mechanism to Enhance Security in the Cloud Environment. (2014). International Journal of Current Engineering and Technology, 4(5), 3278-3281. https://ijcet.evegenis.org/index.php/ijcet/article/view/1240