A new secure authentication scheme for cloud computing environment.
Suyel NamasudraPinki RoyPublished in: Concurr. Comput. Pract. Exp. (2017)
Keyphrases
- authentication scheme
- cloud computing environment
- cloud computing
- load balancing
- user authentication
- smart card
- virtual machine
- open architecture
- secret key
- security flaws
- authentication protocol
- security analysis
- public key
- load balance
- computing resources
- distributed computing
- key management
- computing platform
- computing environments
- resource allocation
- cloud services
- service providers
- information systems
- databases
- operating system