ACM Transactions on Information and System Security (TISSEC)
Dynamic Virtual Private Networks
Dynamic Virtual Private Networks
ID-based password authentication scheme using smart cards and fingerprints
ACM SIGOPS Operating Systems Review
Computer Security in the Real World
Computer
Paranoid penguin: two-factor authentication
Linux Journal
Privacy preserving multi-factor authentication with biometrics
Proceedings of the second ACM workshop on Digital identity management
Implementing internet key exchange (IKE)
ATEC '00 Proceedings of the annual conference on USENIX Annual Technical Conference
A Secure Routing Protocol for Wireless Embedded Networks
RTCSA '08 Proceedings of the 2008 14th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications
Dynamic Routing with Security Considerations
IEEE Transactions on Parallel and Distributed Systems
Shibboleth-based Access to and Usage of Grid Resources
GRID '06 Proceedings of the 7th IEEE/ACM International Conference on Grid Computing
Advanced smart card based password authentication protocol
Computer Standards & Interfaces
MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication
SOSE '10 Proceedings of the 2010 Fifth IEEE International Symposium on Service Oriented System Engineering
Security and Cloud Computing: InterCloud Identity Management Infrastructure
WETICE '10 Proceedings of the 2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises
Secure cloud computing with a virtualized network infrastructure
HotCloud'10 Proceedings of the 2nd USENIX conference on Hot topics in cloud computing
Archiving as a service: a model for the provision of shared archiving services using cloud computing
Proceedings of the 2011 iConference
Password based remote authentication scheme using ECC for smart card
Proceedings of the 2011 International Conference on Communication, Computing & Security
Eliminating the hypervisor attack surface for a more secure cloud
Proceedings of the 18th ACM conference on Computer and communications security
Addressing cloud computing security issues
Future Generation Computer Systems
What makes users refuse web single sign-on?: an empirical investigation of OpenID
Proceedings of the Seventh Symposium on Usable Privacy and Security
A Dynamic VPN Architecture for Private Cloud Computing
UCC '11 Proceedings of the 2011 Fourth IEEE International Conference on Utility and Cloud Computing
Design and implementation of SIP security
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
Getting web authentication right: a best-case protocol for the remaining life of passwords
SP'11 Proceedings of the 19th international conference on Security Protocols
Virtual switching without a hypervisor for a more secure cloud
Hot-ICE'12 Proceedings of the 2nd USENIX conference on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services
How to federate VISION clouds through SAML/Shibboleth authentication
ESOCC'12 Proceedings of the First European conference on Service-Oriented and Cloud Computing
A client-centric ASM-based approach to identity management in cloud computing
ER'12 Proceedings of the 2012 international conference on Advances in Conceptual Modeling
A survey on security issues and solutions at different layers of Cloud computing
The Journal of Supercomputing
Hi-index | 0.00 |
Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third-party and hosted internally or externally. It provides a flexible way to extend the working environment. Since the business process that working on them could be critical, it is important to provide a secure environment for organizations to execute those processes. While user mobility has become an important feature for many systems, technologies that provide users a lower cost and flexible way in joining a secure private cloud are in a strong demand. This paper exploits the key management mechanisms to have secured tunnels with private cloud for users who might move around dynamically without carrying the same machine. A strong authentication with a key agreement scheme is proposed to establish the secure tunnel. Furthermore, the proposed framework also provides mutual authentication, session key renewal between the users and the cloud server. Several related security properties of the proposed mechanism are also presented.