Download Now Free registration required
Network bandwidth and hardware technology are developing rapidly, resulting in the vigorous development of the Internet. A new concept, cloud computing, uses low-power hosts to achieve high quality service. According to the characteristics of cloud computing, the enterprises can support the business services on the Internet. However, there are a lot of applications and data centers in the cloud computing environment, hence, the issues of Information and communication security and authentication must be considered. In this paper, a protocol, Cipher-based Authentication and Key Agreement (CAKA), is proposed that the information communication and authentication of information services and data center can be provided.
- Format: PDF
- Size: 210.4 KB