Indian Journal of Science and Technology
Year: 2018, Volume: 11, Issue: 15, Pages: 1-6
Abdullah AlNuaim* and Shakeel Ahmed
*Author for correspondence
College of Computer Sciences and Information Technology, King Faisal University, Hofuf, Saudi Arabia; [email protected]
Objective: Cloud Computing is the future solution which all companies in the world aim to depend on for its day to day operations because of its big advantages compared with that of the on premises systems. The major challenging issues in Cloud-based environment are security, user authentication, access control, and ensuring the security of stored data in Cloud servers which makes most of the functional and technical people to work on the aspects of security and to provide a solution to secure Cloud computing. Methods: Fog computing is one of the solutions created by Cisco and it is defined as the extension of the Cloud Computing paradigm, its distinctive characteristics in the location sensitivity, wireless connectivity, and geographical accessibility. Accordingly, this research offers an efficient user authentication scheme for Cloud computing by designing the user authentication and access control at the Fog level where, a client-based user authentication methodology has been introduced to confirm identity of the user at client-side to access the Cloud which will enhance the reliability and rate of trust in Cloud computing environments. The system currently being proposed is implemented on mobile devices using an application connected to a Fog node which is further connected to the Cloud node. Findings: In overall, the analysis of the suggested scheme shows that, designing this user authentication and access control model will enhance the security and rate of trust in Cloud computing environments as an emerging and powerful technology in various industries. Application: By incorporating the secured scheme of authentication, Security of Cloud computing environments can be enhanced and protect the system from unauthorized users.
Keywords: Authentication, Cloud Computing, Fog Computing, Man-in-Middle, SMS
Subscribe now for latest articles and news.