Loading…

User Authentication using Profiling in Mobile Cloud Computing

As Cloud Computing has been spreading widely, users and service providers enables to use resource or service cheaply and easily without owning all the resource needed. However, cloud computing, virtualization technology, large distributed processing technologies, service availability, high–traffic p...

Full description

Saved in:
Bibliographic Details
Published in:AASRI procedia 2012, Vol.2, p.262-267
Main Authors: Jeong, Hoon, Choi, Euiin
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:As Cloud Computing has been spreading widely, users and service providers enables to use resource or service cheaply and easily without owning all the resource needed. However, cloud computing, virtualization technology, large distributed processing technologies, service availability, high–traffic processing will occur due to various problems. In recent years, among many of these problems in application security, access control, authentication, and password and a lot of it has been studied. User authentication in a mobile environment, especially the more important to them and high level of security certification is required. In this paper, in a mobile environment for high level security authentication using profiling techniques for access control and user authentication is proposed.
ISSN:2212-6716
2212-6724
DOI:10.1016/j.aasri.2012.09.044