Design and Implementation of Enhanced Security Algorithm for Hybrid Cloud using Kerberos

SK Tiwari, SG Neogi - SN Computer Science, 2023 - Springer
Cloud computing refers to a network-enabled service that allows users to access large data
centres and web services through the internet. A hybrid cloud comprises of both private and …

[PDF][PDF] Authentication techniques in cloud and mobile cloud computing

M Hasan, MH Riaz, MA Rahman - International Journal of …, 2017 - researchgate.net
A major challenge in cloud and mobile cloud computing is to ensure security and privacy of
user's personal information (eg, financial data, health record, location information) from …

Mutual user Authentication using Inherent Techniques for Cloud and Fog Computing

II Imran, RA Jaleel - 2023 3rd International Conference on …, 2023 - ieeexplore.ieee.org
Fog computing is a current computing paradigm that extends cloud computing to the
network's edge. This expansion has become essential due to the widespread adoption of …

Privacy Protection Smartcard Authentication Scheme in Cloud Computing

K Fan, H Deng, H Li, Y Yang - Chinese Journal of Electronics, 2018 - Wiley Online Library
Cloud computing provides users with a great deal of flexibility and convenience. However,
cloud computing also brings very serious security problems, especially for enterprise data …

Tap based user authentication on smartphones for visually impaired people

A Banerjee, M Hasan - 2018 9th International Conference on …, 2018 - ieeexplore.ieee.org
User authentication is essential to provide security, privacy, and accountability. The identity
of an individual or a device is verified through the authentication process. Traditional …

Token-Based Authentication Techniques on Open Source Cloud Platforms

A Banerjee, M Hasan - Sistemas y Telemática, 2018 - icesi.edu.co
Cloud computing is a service-oriented computational platform that allows on-demand
resource provisioning for low-cost application deployment. However, security and privacy of …

A modified authentication approach for cloud computing in e-healthcare systems

R Yadav, A Sharma - An Interdisciplinary Approach to Modern …, 2022 - taylorfrancis.com
The opportunity to access on-demand, unbounded computation and storage resources has
increasingly motivated users to move their health records from local data centers to the …

[PDF][PDF] Two Way Authentication for Analytics as a Service in Cloud

DP Tshilombo, VVG Rao - ISSN (Online), 2019 - ijresm.com
Every enterprise strives to be truly data driven with analytics embedded into every level of
decision making. Analytics offer away of changing the abstraction of messy data …

STRENGTHENING THE SECURITY OF MOBILE CLOUD COMPUTING USING HYBRID AUTHENTICATION TECHNIQUES

E Amdie - 2021 - repository.smuc.edu.et
The mobile cloud computing has become a popular business transaction platform today
because modern mobile sets are not used just for making calls and sending messages …

Tecnicas de autenticacion basadas en tokens en plataformas de codigo abierto en la nube

A Banerjee, M Hasan - Sistemas & Telematica, 2018 - go.gale.com
El concepto de computación en la nube hace referencia al uso de una plataforma
computacional externa, orientada a servicios, que permite suministrar recursos bajo …