Securing user Authentication through Customized X.509 in Cloud Computing
Imran Ijaz1, Muhammad Hasan Islam2, Maria Kanwal3, Tahreem Yaqoob4

1AImran Ijaz, ITC, Fatima Jinnah Women University Rawalpindi, SZABIST Islamabad, Pakistan.
2Dr. Muhammad Hasan Islam, Rawalpindi, Pakistan.
3Maria Kanwal, Computer Sciences Dept., Fatima Jinnah Women University, Rawalpindi, Pakistan.
4Tahreem Yaqoob, Computer Sciences Dept., Fatima Jinnah Women University, Rawalpindi, Pakistan.
Manuscript received on June 25, 2014. | Revised Manuscript received on July 03, 2014. | Manuscript published on July 05, 2014. | PP: 90-94 | Volume-4, Issue-3, July 2014. | Retrieval Number: C2304074314 /2012©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: Cloud computing, a highly flexible and user friendly technology of the era providing benefits like accessibility, scalability, reliability and cost effeteness but on the other hand many security and privacy issues arises with the rapid increase of users. Weak authentication process is one of the biggest problem towards breach and most of the time it happened when credentials openly travel over the public internet. To overcome this issue many authentication schemes have been made or modified but problem still persists. In our previous scheme which was based on tunneling using PPTP, effectively works in the scenario [1]. This work is the extension of previous scheme with a customized PKI based certificate to enhance security mechanism through encryption up to 2048 bits 
Keywords: Cloud Computing, Secure User Authentication, PKI, VPN Server, X.509.