Authors
Hoda Jannati, Behnam Bahrak
Publication date
2017/12/1
Journal
International Journal of Critical Infrastructure Protection
Volume
19
Pages
59-67
Publisher
Elsevier
Description
Cloud computing is a popular network access model for the transparent and ubiquitous sharing of services and computing resources among customers by service providers. In the critical infrastructure domain, cloud computing is used by governments for applications such as revenue collection to improve operations and achieve cost savings. Although cloud computing systems promise convenience, they threaten the privacy of users who transfer their applications to the cloud. In order to prevent illegal access, it is imperative that cloud providers implement secure authentication schemes.
Tsai and Lo have recently proposed an efficient authentication protocol based on a bilinear pairing cryptosystem for use in distributed mobile cloud computing services. They claim that the protocol provides mutual authentication and privacy to users, and also generates and exchanges session keys for each pair of communicating …
Total citations
201820192020202120222023126122
Scholar articles
H Jannati, B Bahrak - International Journal of Critical Infrastructure Protection, 2017