{"title":"SUAS:用于安全访问基于云的环境的可扩展用户身份验证方案","authors":"Faraz Fatemi Moghaddam, Rama Roshan Ravan, T. Khodadadi, Yashar Javadianasl, Abbasali Halalzadeh","doi":"10.1109/ISCAIE.2014.7010205","DOIUrl":null,"url":null,"abstract":"Cloud computing is an emerging technology that uses the concepts of virtualization, storage, and sharing to store and share resources between users and enterprises. This newfound technology is still unclear to many security problems and one of the most challenging issues in these environments is the reliability of the user authentication process. Therefore, this paper offers an efficient and scalable user authentication scheme for cloud-based environments. The proposed model uses the concepts of agents, cryptography, and key exchanging to enhance and improve the performance of the user authentication and the rate of scalability in cloud-based environments respectively. For achieving to this purpose, the proposed model has been presented based on three main agents: first user authentication agent, second user authentication agent and key manager agent. These agents have divided the process of user authentication and managing keys into several parts to improve the rate of efficiency in this process. Furthermore, the suggested model tries to resist against possible attacks. SUAS, as the suggested model was introduced and simulated in this paper for evaluating the performance and security of the scheme. In overall, the results show that the proposed model has considerable advantages for using in cloud-based environment to increase the salacity, reliability and efficiency of cloud computing models as an emerging technology.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"SUAS: Scalable user authentication scheme for secure accessing to cloud-based environments\",\"authors\":\"Faraz Fatemi Moghaddam, Rama Roshan Ravan, T. Khodadadi, Yashar Javadianasl, Abbasali Halalzadeh\",\"doi\":\"10.1109/ISCAIE.2014.7010205\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is an emerging technology that uses the concepts of virtualization, storage, and sharing to store and share resources between users and enterprises. This newfound technology is still unclear to many security problems and one of the most challenging issues in these environments is the reliability of the user authentication process. Therefore, this paper offers an efficient and scalable user authentication scheme for cloud-based environments. The proposed model uses the concepts of agents, cryptography, and key exchanging to enhance and improve the performance of the user authentication and the rate of scalability in cloud-based environments respectively. For achieving to this purpose, the proposed model has been presented based on three main agents: first user authentication agent, second user authentication agent and key manager agent. These agents have divided the process of user authentication and managing keys into several parts to improve the rate of efficiency in this process. Furthermore, the suggested model tries to resist against possible attacks. SUAS, as the suggested model was introduced and simulated in this paper for evaluating the performance and security of the scheme. In overall, the results show that the proposed model has considerable advantages for using in cloud-based environment to increase the salacity, reliability and efficiency of cloud computing models as an emerging technology.\",\"PeriodicalId\":385258,\"journal\":{\"name\":\"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-04-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCAIE.2014.7010205\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCAIE.2014.7010205","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
SUAS: Scalable user authentication scheme for secure accessing to cloud-based environments
Cloud computing is an emerging technology that uses the concepts of virtualization, storage, and sharing to store and share resources between users and enterprises. This newfound technology is still unclear to many security problems and one of the most challenging issues in these environments is the reliability of the user authentication process. Therefore, this paper offers an efficient and scalable user authentication scheme for cloud-based environments. The proposed model uses the concepts of agents, cryptography, and key exchanging to enhance and improve the performance of the user authentication and the rate of scalability in cloud-based environments respectively. For achieving to this purpose, the proposed model has been presented based on three main agents: first user authentication agent, second user authentication agent and key manager agent. These agents have divided the process of user authentication and managing keys into several parts to improve the rate of efficiency in this process. Furthermore, the suggested model tries to resist against possible attacks. SUAS, as the suggested model was introduced and simulated in this paper for evaluating the performance and security of the scheme. In overall, the results show that the proposed model has considerable advantages for using in cloud-based environment to increase the salacity, reliability and efficiency of cloud computing models as an emerging technology.