Next Article In Volume>
Research on the Security Management Method of Cloud Computing Authorized User Based on Anonymous OTP
Authors
Baoli Yuan
Corresponding Author
Baoli Yuan
Available Online February 2016.
- DOI
- 10.2991/iccsae-15.2016.1How to use a DOI?
- Keywords
- Anonymous OTP, Cloud Computing; Authorized User; Security Management Method
- Abstract
For the information security issues of cloud computing, this paper studys the security management methods of cloud computing authorized user, analyzes the vulnerabilities of OTP and proposed security authentication scheme based on OTP authentication.This authentication enables two-way authentication between the user and the service provider, effectively prevent middleman attack, reduce information leakage and relise secure communications.
- Copyright
- © 2016, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Next Article In Volume>
Cite this article
TY - CONF AU - Baoli Yuan PY - 2016/02 DA - 2016/02 TI - Research on the Security Management Method of Cloud Computing Authorized User Based on Anonymous OTP BT - Proceedings of the 2015 5th International Conference on Computer Sciences and Automation Engineering PB - Atlantis Press SP - 1 EP - 4 SN - 2352-538X UR - https://doi.org/10.2991/iccsae-15.2016.1 DO - 10.2991/iccsae-15.2016.1 ID - Yuan2016/02 ER -