Proceedings of the 2015 5th International Conference on Computer Sciences and Automation Engineering

Research on the Security Management Method of Cloud Computing Authorized User Based on Anonymous OTP

Authors
Baoli Yuan
Corresponding Author
Baoli Yuan
Available Online February 2016.
DOI
10.2991/iccsae-15.2016.1How to use a DOI?
Keywords
Anonymous OTP, Cloud Computing; Authorized User; Security Management Method
Abstract

For the information security issues of cloud computing, this paper studys the security management methods of cloud computing authorized user, analyzes the vulnerabilities of OTP and proposed security authentication scheme based on OTP authentication.This authentication enables two-way authentication between the user and the service provider, effectively prevent middleman attack, reduce information leakage and relise secure communications.

Copyright
© 2016, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2015 5th International Conference on Computer Sciences and Automation Engineering
Series
Advances in Computer Science Research
Publication Date
February 2016
ISBN
10.2991/iccsae-15.2016.1
ISSN
2352-538X
DOI
10.2991/iccsae-15.2016.1How to use a DOI?
Copyright
© 2016, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Baoli Yuan
PY  - 2016/02
DA  - 2016/02
TI  - Research on the Security Management Method of Cloud Computing Authorized User Based on Anonymous OTP
BT  - Proceedings of the 2015 5th International Conference on Computer Sciences and Automation Engineering
PB  - Atlantis Press
SP  - 1
EP  - 4
SN  - 2352-538X
UR  - https://doi.org/10.2991/iccsae-15.2016.1
DO  - 10.2991/iccsae-15.2016.1
ID  - Yuan2016/02
ER  -