Loading…
User Authentication using Profiling in Mobile Cloud Computing
As Cloud Computing has been spreading widely, users and service providers enables to use resource or service cheaply and easily without owning all the resource needed. However, cloud computing, virtualization technology, large distributed processing technologies, service availability, high–traffic p...
Saved in:
Published in: | AASRI procedia 2012, Vol.2, p.262-267 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | As Cloud Computing has been spreading widely, users and service providers enables to use resource or service cheaply and easily without owning all the resource needed. However, cloud computing, virtualization technology, large distributed processing technologies, service availability, high–traffic processing will occur due to various problems. In recent years, among many of these problems in application security, access control, authentication, and password and a lot of it has been studied. User authentication in a mobile environment, especially the more important to them and high level of security certification is required. In this paper, in a mobile environment for high level security authentication using profiling techniques for access control and user authentication is proposed. |
---|---|
ISSN: | 2212-6716 2212-6724 |
DOI: | 10.1016/j.aasri.2012.09.044 |