Have a personal or library account? Click to login
Advanced Secure User Authentication Framework for Cloud Computing Cover
By: Rui Jiang  
Open Access
|Sep 2013

References

  1. Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, Matei Zaharia, "A view of cloud computing", Communications of the ACM, 53 (4), 2010, pp.50-58.10.1145/1721654.1721672
  2. Hassan Takabi, James B. D. Joshi, Gail-Joon Ahn, “Secure Cloud: Towards a Comprehensive Security Framework for Cloud Computing Environments”, Proceedings of 34th IEEE Conference Workshops on Computer Software and Applications, 19-23 July, 2010, Pittsburgh, PA, USA, pp. 393-398.10.1109/COMPSACW.2010.74
  3. Chun-Ting Huang, Zhongyuan Qin, C.-C. Jay Ku, “Multimedia Storage Security in Cloud computing: An Overview”, Proceedings of 13th IEEE International Workshop on Multimedia Signal Processing, 17-19 October, 2011, Los Angles, CA, USA, pp.1-6.10.1109/MMSP.2011.6093775
  4. Jack Newton, “Beyond Passwords: Two Factor Authentication Comes to the Cloud”, http:// www.slaw.ca /2010 /09/20/, 2010.
  5. L. Lamport, “Password authentication with insecure communication”, Communications of the ACM, 24 (11), 1981, pp. 770–771.10.1145/358790.358797
  6. M.S. Hwang, and L.H. Li, “A New Remote User Authentication Scheme using Smart Cards”, IEEE Transactions on Consumer Electronics, 46 (1), 2000, pp.28-30.10.1109/30.826377
  7. H.Y. Chien, J.K. Jan, Y.M. Tseng, “An efficient and practical solution to remote authentication smart card”, Computers & Security, 21(4), 2002, pp. 372–375.10.1016/S0167-4048(02)00415-7
  8. W.C. Ku, S.M. Chen, “Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards”, IEEE Transactions on Consumer Electronics, 50 (1), 2004, pp.204–207.10.1109/TCE.2004.1277863
  9. C. Mitchell, “Limitations of challenge-response entity authentication”, Electronic Letters, 25 (17), 1989, pp. 1195–1196.10.1049/el:19890801
  10. W.C. Ku, C.M. Chen, H.L. Lee, “Cryptanalysis of a variant of Peyravian–Zunic’s password authentication scheme”, IEICE Transactions on Communication, E86-B (5), 2003, pp.1682–1684.
  11. T. H. Chen and J. C. Huang, “A novel user-participating authentication scheme,” The Journal of Systems and Software, 83(5), 2010, pp.861–867.10.1016/j.jss.2009.12.022
  12. Chun-Ta Li, Cheng-Chi Lee, “A robust remote user authentication scheme using smart card”, Information Technology and Control, 40 (3), 2011, pp. 236-245.10.5755/j01.itc.40.3.632
  13. H. C. Hsiang and W. K. Shih, “Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards,” Computer Communications, 32(4), 2009, pp. 649–652.10.1016/j.comcom.2008.11.019
  14. Amlan Jyoti Choudhury, Pardeep Kumar, Managal Sain, Hyotaek Lim, Hoon Jae-Lee, “A Strong User Authentication Framework for Cloud Computing”, Proceedings of 2011 IEEE Asia-Pacific Services Computing Conference, Jeju, South Korea, December 12-15, 2011, pp.110-115.10.1109/APSCC.2011.14
  15. I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang, “A password authentication scheme over insecure networks”, Journal of Computer and System Sciences , 72(4), 2006, pp.727-740.10.1016/j.jcss.2005.10.001
  16. S21sec, “ZeuS Mitmo: Man-in-the-mobile”, http: //securityblog.s21sec.com/2010/09/zeus–man – in – mobile –i.html, 2011.
  17. Szu-yu Lin, “Enhancing the security of out-of-band one-time password two factor authentication in cloud computing”, http://pc01.lib.ntust.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720111-153542, 2011.
  18. F. T. Fábrega, J. Herzog, and J. Guttman, “Strand spaces: Proving security protocols correct,” Journal of Computer Security, 7(2/3), 1999, pp.191–230.10.3233/JCS-1999-72-304
  19. J. D. Guttman and F. J. Thayer Fabrega, “Authentication tests and the structure of bundles”, Theoretical Computer Science, 283(2), 2002, pp.333-380.10.1016/S0304-3975(01)00139-6
Language: English
Page range: 1700 - 1724
Submitted on: Mar 17, 2013
|
Accepted on: Jul 22, 2013
|
Published on: Sep 5, 2013
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2013 Rui Jiang, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.