

Keywords: authorisation cloud computing ID-based user authentication scheme authorization cloud computing environments Authentication Cloud computing Cryptography Law Nickel Servers ID-based scheme anonymity cloud computing cryptography mobile devices user authentication (ID#:15-4065) Therefore, the proposed scheme is more efficient and practical than the related works. In addition, it can be easily applied to cloud computing environments. Compared with the related works, the proposed scheme has higher security levels and lower computation costs. To solve the above problems, we propose a new ID-based user authentication scheme for cloud computing in this paper. Besides, it cannot be implemented in cloud computing. However, we find that most of the previous authentication schemes have some security problems. Therefore, many user authentication schemes for cloud computing have been proposed in recent years. doi: 10.1109/IIH-MSP.2014.31Ībstract: In cloud computing environments, the user authentication scheme is an important security tool because it provides the authentication, authorization, and accounting for cloud users. Jen Ho Yang Pei Yu Lin, "An ID-Based User Authentication Scheme for Cloud Computing," Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on, pp.98,101, 27-29 Aug. Keywords: authorisation cloud computing public key cryptography audit stage authorization stage biometric encryption cloud computing environment encryption technology homomorphism technology identity authentication scheme public key cryptography register and training template stage voice login and authentication stage voice technology Authentication Cloud computing Encryption Servers Spectrogram Training cloud computing homomorphism identity authentication (ID#:15-4064) The results prove the scheme has certain advantages in four aspects. The scheme is divided into four stages, register and training template stage, voice login and authentication stage, authorization stage, and audit stage.

Identity authentication scheme is proposed based on the voice and homomorphism technology.

doi: 10.1109/ICICTA.2014.10Ībstract: An identity authentication scheme is proposed combining with biometric encryption, public key cryptography of homomorphism and predicate encryption technology under the cloud computing environment. Miao Yingkai Chen Jia, "A Kind of Identity Authentication under Cloud Computing Environment," Intelligent Computation Technology and Automation (ICICTA), 2014 7th International Conference on, pp. The work presented here was published in 2014. The research cited here explores new methods and techniques for improving security in cloud environments, efficient cryptographic computations, and exascale storage systems.

As systems become larger, faster and more complex, authorization and authentication methods and protocols are proving to have limits and challenges. Authorization and authentication are cornerstones of computer security.
