scholarly journals Secure Authentication System for Hybrid Cloud Service in Mobile Communication Environments

2014 ◽  
Vol 10 (2) ◽  
pp. 828092 ◽  
Author(s):  
Jin-Mook Kim ◽  
Jeong-Kyung Moon
2013 ◽  
Vol 281 ◽  
pp. 86-89
Author(s):  
Jeong Kyong Moon ◽  
Jin Mook Kim ◽  
Hwang Rae Kim ◽  
Hwa Young Jeong

Recently, the amount of cloud service usage is increasing explosively. Specially, request of cloud service that use do computer or mobile communication device is very high in university or book related organ. However, level of security service is very low that against of amounts that using request in BRS (book retrieval system). Therefore, we wish to give other access grade in user in this research and propose easy and safe authentication method (ESAM: Easy and Secure Authentication Method using PMI) to book retrieval system so that access control and authentication about user may be available. Our proposed method based on PMI’s attributes certificate technique. And our scheme can solve various security problems on existent book retrieval system. After next study, we will investigate our propose method against of existent way and improve our method is more good.


2021 ◽  
Vol 17 (1) ◽  
pp. 287-292
Author(s):  
Adriana-Meda UDROIU ◽  
Ștefan-Antonio DAN-ȘUTEU

Abstract: We introduce the term usable security to refer to security systems, models, mechanisms and applications that have as the main goal usability. Secure systems cannot exist without secure authentication methods. Thus we outline biometric authentication methods and we focus on iris recognition because is the most reliable and accurate method for human identification]. The most important advantage of iris biometric over other biometrics is that irises have enormous pattern variability meaning that the variation between individual is almost maximum and variation for any person across time or conditions is minimum. Taking into consideration this observations, this survey covers researches in this field, methods of technical implementation and the usability of this method as an authentication system on iOS environment.


2021 ◽  
Vol 11 (3) ◽  
pp. 19-32
Author(s):  
Shahin Fatima ◽  
Shish Ahmad

Cloud computing has become a feasible solution for virtualization of cloud resources. Although it has many prospective to hold individuals by providing many benefits to organizations, still there are security loopholes to outsource data. To ensure the ‘security' of data in cloud computing, quantum key cryptography is introduced. Quantum cryptography makes use of quantum mechanics and qubits. The proposed method made use of quantum key distribution with Kerberos to secure the data on the cloud. The paper discussed the model for quantum key distribution which makes use of Kerberos ticket distribution center for authentication of cloud service providers. The proposed model is compared with quantum key distribution and provides faster computation by producing less error rate.


Sign in / Sign up

Export Citation Format

Share Document