Back to Search

An Authentication Model for Cloud Computing Application

AUTHOR Al-Khashab, Rafal; Al-Khashab Rafal
PUBLISHER LAP Lambert Academic Publishing (03/06/2014)
PRODUCT TYPE Paperback (Paperback)

Description
Recently cloud computing is considered the next generation in world of the internet.The concept of cloud computing is a model for sharing resources like serves, storage, network, and application, Cloud computing made service available for customer in open environment. Thus, it is important to provide authentication to communicate through cloud. Cloud users feeling that their data will be secured and available to them. In this study, the researcher designed successful implementation of cloud authentication; when the users used the internet and before any communication across a network they need to be authenticated with the cloud. A third party is responsible to check if the user is authorized or not, after that, it gives identification to the user for safety access to the cloud. The researcher used multiple password mechanism by generating new password every log-in instead of using single password. In other words, they generated multiple passwords from one password to provide more security for the user, application, and cloud. The proposed model has been implemented on the personal cloud due to its basic structure for the other clouds deployment.
Show More
Product Format
Product Details
ISBN-13: 9783659189883
ISBN-10: 365918988X
Binding: Paperback or Softback (Trade Paperback (Us))
Content Language: English
More Product Details
Page Count: 104
Carton Quantity: 68
Product Dimensions: 6.00 x 0.25 x 9.00 inches
Weight: 0.36 pound(s)
Country of Origin: US
Subject Information
BISAC Categories
Computers | General
Descriptions, Reviews, Etc.
publisher marketing
Recently cloud computing is considered the next generation in world of the internet.The concept of cloud computing is a model for sharing resources like serves, storage, network, and application, Cloud computing made service available for customer in open environment. Thus, it is important to provide authentication to communicate through cloud. Cloud users feeling that their data will be secured and available to them. In this study, the researcher designed successful implementation of cloud authentication; when the users used the internet and before any communication across a network they need to be authenticated with the cloud. A third party is responsible to check if the user is authorized or not, after that, it gives identification to the user for safety access to the cloud. The researcher used multiple password mechanism by generating new password every log-in instead of using single password. In other words, they generated multiple passwords from one password to provide more security for the user, application, and cloud. The proposed model has been implemented on the personal cloud due to its basic structure for the other clouds deployment.
Show More
Your Price  $79.50
Paperback