Skip to main content
Log in

Authentication scheme for smart learning system in the cloud computing environment

  • Original Article
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

Because cloud computing provides a computing power, a development environment, and storage spaces as much as user to want, the range of its use is increasingly expanded, and also service of cloud computing for mobile devices is increased. The existing education environment is being changed for smart learning environment using smart equipment and cloud computing. All information of users using cloud computing is stored in the cloud server. Thus, as users’ anxiety to use it is weighted, one of the most important things to consider is the security issues in cloud computing environments. Cloud computing requires authentication scheme to provide high quality security in order to securely keep date in the server. This study aims to propose secure authentication scheme of the smart learning system in the cloud computing environment. In this way, the authentication scheme allows user securely to have access to the smart learning system in the cloud environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Hyeonseung, K., Chunsik, P.: Cloud computing and personal authentication service. J. Korea Inst. Inf. Secur. Cryptol. 20(2), 11–19 (2010)

    Google Scholar 

  2. Roh, G.-S., Joo, S.-H., Jung, J.-T.: An exploratory study on concept and realization conditions of smart learning. J. Dig. Policy Manag. 9(2), 79–88 (2012)

    Google Scholar 

  3. Jeong, Y.-S., Lee, S.-H.: User authentication protocol through distributed process for cloud environment. J. Korea Inst. Inf. Secur. Cryptol. 22(4), 841–884 (2012)

    MathSciNet  Google Scholar 

  4. Jeong, H.-Y., Kim, Y.-H.: A design of u-Learning’s teaching and learning model in the cloud computing environment. Korea Navig. Inst. (KONI) 13(5), 781–786 (2009)

    MathSciNet  Google Scholar 

  5. Lee, S., Lim, T., Lee, H.J.: Two factor authentication for cloud computing. Int. J. KIMICS 8, 427–432 (2010)

    Google Scholar 

  6. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)

    Article  Google Scholar 

  7. Bertino, E., Paci, F., Ferrini, R., Shang, N.: Privacy-preserving digital identity management for cloud computing. Bull. IEEE Comput. Soc. Tech. Comm. Data Eng. 32(1), 21–27 (2009)

    Google Scholar 

  8. Daemen, J., Rijmen, V.: The design of Rijndael: AES—the advanced encryption standard. Springer, Berlin (2002)

    Book  MATH  Google Scholar 

  9. Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(12), 770–772 (1981)

    Article  Google Scholar 

  10. Popovic, K., Hocenski, Z.: Cloud Computing security issues and challenges. In: The 3rd international conference on advances in human-oriented and personalized mechanisms, technologies, and services, pp. 344–349 (2010)

  11. Meniya, A.D., Jethva, H.B.: Single-Sign-On (SSO) across open cloud computing federation. Int. J. Eng. Res. Appl. (IJERA) 2(1), 891–895 (2012)

  12. Almutairi, A., Sarfraz, M., Basalamah, S.: A distributed access control architecture for cloud computing. IEEE Softw. 29, 36–44 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aeri Lee.

Additional information

Special Issue: Convergence Security Systems.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lee, A. Authentication scheme for smart learning system in the cloud computing environment. J Comput Virol Hack Tech 11, 149–155 (2015). https://doi.org/10.1007/s11416-015-0240-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-015-0240-4

Keywords

Navigation