Loading

Designs A Multi-user Authentication Structure Optimized for Cloud Environments
Yoon-Su Jeong1, Dong-Ryool Kim2, Seung-Soo Shin3

1Yoon-Su Jeong, Department of Information and Communication Convergence Engineering, Mokwon University, Daejeon, Korea, East Asian.

2Dong-Ryool Kim, School of Mechatronics Engineering, Tongmyong University, Busan, Korea, East Asian.

3Seung-Soo Shin, Department of Information Security, Tongmyong University, Busan, Korea, East Asian.

Manuscript received on 10 June 2019 | Revised Manuscript received on 17 June 2019 | Manuscript Published on 22 June 2019 | PP: 800-806 | Volume-8 Issue-8S2 June 2019 | Retrieval Number: H11340688S219/19©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: With the recent rapid development of IT technology based on the Internet, devices used in cloud environments are rapidly changing from regular PCs to cell phones or tablet PCs. Small devices, such as mobile phones or tablet PCs, are more easily used wirelessly than wired, so there is a problem with users’ privacy information being exposed to maliciously from third parties. Performance evaluations show that small wireless devices using virtual multi-group factor in cloud environments have an average of 14.8 % more accuracy in the information they process to protect users’ privacy. The processing efficiency with which users’ privacy information using small wireless devices is sent and received to cloud-certified servers has increased by up to 19.6 %. In addition, processing time was 21.1% lower when users’ privacy between small wireless devices and cloud-certified servers was handled in a virtual environment. In this paper, we propose user privacy protection techniques using virtual multi-group factor to prevent third parties from using the privacy of users with cloud services around small wireless devices in use in wireless environments. The proposed technique is used to replicate multi-group factor in a virtual environment for synchronization of servers and intermediate devices, and to shorten the time of authentication processing process that protects users’ privacy. Proposed techniques use functions and random numbers for synchronizing servers and intermediate devices operating in virtual environments to safely prevent malicious attacks from third parties.

Keywords: Cloud Service, Authentication, Multi-User, Signature.
Scope of the Article: Communication