{"title":"Security Technique for Authentication Process in the Cloud Environment","authors":"O. Oksiiuk, V. Chaikovska, Andriy Fesenko","doi":"10.1109/PICST47496.2019.9061248","DOIUrl":null,"url":null,"abstract":"Cloud technology is a prospective field of information technology. Moreover, this development is always accompanied by a variety of vulnerabilities that are exploited by malicious people to access data stored in cloud environment. Data protection is one of the most challenging issues of cybersecurity. Since many companies have decided to store their data in cloud services, it is extremely important to provide information security in general. Thus, the most vulnerable point is the authentication process. In this paper the requirements for information technology protection based on SRP protocol were defined. Also the architecture of next generation data center based on cloud computing was developed.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"18 1","pages":"379-382"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PICST47496.2019.9061248","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Cloud technology is a prospective field of information technology. Moreover, this development is always accompanied by a variety of vulnerabilities that are exploited by malicious people to access data stored in cloud environment. Data protection is one of the most challenging issues of cybersecurity. Since many companies have decided to store their data in cloud services, it is extremely important to provide information security in general. Thus, the most vulnerable point is the authentication process. In this paper the requirements for information technology protection based on SRP protocol were defined. Also the architecture of next generation data center based on cloud computing was developed.