Abstract
The growth of local data annually implies extra charges for the customers, which makes their business slowing down. Cloud computing paradigm comes with new technologies that offer a very economic and cost-effective solution, but the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud and it is highly crucial to protect the sensitive data and systems in the cloud setting in order to ensure the privacy of its users. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view.
Keywords
References
Baruah, K.C.H., Banerjee, S., Dutta, M.P., Bhunia, C.T.: An improved biometric-based multi server authentication scheme using smart card. Int. J. Secur. Appl. 9(1), 397–408 (2015)
Clement, T.: The security in the cloud computing. Presented in CQSI, October 2012
Nithiavathy, R.: Data Integrity and Data Dynamics with Secure Storage Service in Cloud, Proceedings (2013)
Banerjee, S., Dutta, M.P., Bhunia, C.T.: An improved smart card based anonymous multi-server remote user authentication scheme. Int. J. Smart Home 9(5), 11–22 (2015)
Kumbhare, A., Simmhan, P., Prasanna, V.: Cryptonite: a secure and performant data. In: IEEE 5th International Conference on Cloud Computing (CLOUD), pp. 510–519. IEEE (2016)
Huang, H., Liu, K.: Efficient key management for preserving HIPAA regulations. J. Syst. Softw. 84, 122–221 (2015)
El Makkaoui, K., Ezzati, A., Beni-Hssane, A., Motamed, C.: Data confidentiality in the word of cloud. J. Theor. Appl. Inf. Technol. 84(3) (2016)
Pippal, R.S., Wu, S.: Robust smart card authentication scheme for multi-server architecture. Wirel. Pers. Commun. 72(1), 729–745 (2013)
Idrissi, H.K., Kartit, A., El Marraki, M.: A taxonomy and survey of cloud computing. Presented at the Security Days (JNS3), pp. 1–5 (2013)
Merkle, R.C.: A certified digital signature. In: Proceedings of 9th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO 1989, Santa Barbara, California, USA, vol. 435, pp. 218–238 (1989)
Sirohi, P., Agarwal, A.: Cloud computing data storage security framework relating to data integrity, privacy and trust, pp. 4–5 (2015)
Sun, X., Qu, S., Zhu, X., Zhang, M., Ren, Z., Yang, C.: Cloud storage architecture achieving privacy protection and sharing. Appl. Math. Inf. Sci. 9(3), 1639–1644 (2015)
Deyan, D.C., Zhao, H.: Data security and privacy protection issues in CC. In: IEEE International Conference on Computer Science and Electronics Engineering (ICCSEE) (2015)
Petit, A., Ben Mokhtar, L.B., Kosch, H.: Towards efficient and accurate privacy preserving web search. In: MW4NG 2014, Bordeaux, France, 8–12 December (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Leila, M., Abdelhafid, Z., Mahieddine, D. (2018). A New Framework of Authentication Over Cloud Computing. In: Silhavy, R., Silhavy, P., Prokopova, Z. (eds) Cybernetics Approaches in Intelligent Systems. CoMeSySo 2017. Advances in Intelligent Systems and Computing, vol 661. Springer, Cham. https://doi.org/10.1007/978-3-319-67618-0_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-67618-0_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-67617-3
Online ISBN: 978-3-319-67618-0
eBook Packages: EngineeringEngineering (R0)