ABSTRACT

This chapter presents a secure and efficient identity-based mutual authentication protocol for cloud computing. Cloud computing is an Internet-based technology which is providing resource utilization in communication system. In cloud computing the end-user is not conscious with regard to where data is stockpiled and how their data is being developed. Cloud computing technologies are divided into several services, such as: Infrastructure as a service, Platform as a service, Integration Platform as a service, Block-chain as a service, Software as a service, Mobile backend as a service, Serverless computing, and Function as a service. In the cloud environment, outside attackers have to have a whole authentication procedure made necessary by the service producer, whenever they use the cloud facility. Frequently, a client registers through individual data, and a service supplier offers a client’s acquired identifier and a validation technique in favor of client authentication once a registration is completed.