Cloud

Security Enhancement by Cipher-Based Authentication and Key Agreement in a Cloud Computing Environment

Free registration required

Executive Summary

Network bandwidth and hardware technology are developing rapidly, resulting in the vigorous development of the Internet. A new concept, cloud computing, uses low-power hosts to achieve high quality service. According to the characteristics of cloud computing, the enterprises can support the business services on the Internet. However, there are a lot of applications and data centers in the cloud computing environment, hence, the issues of Information and communication security and authentication must be considered. In this paper, a protocol, Cipher-based Authentication and Key Agreement (CAKA), is proposed that the information communication and authentication of information services and data center can be provided.

  • Format: PDF
  • Size: 210.4 KB