Safe Cloud: Secure and Usable Authentication Framework for Cloud Environment

被引:0
作者
Sumitra, Binu [1 ]
Raj, Pethuru [2 ]
Misbahuddin, M. [3 ]
机构
[1] Christ Univ, Bangalore, Karnataka, India
[2] IBM India Pvt Ltd, IBM Cloud Global Ctr Excellence, Bangalore, Karnataka, India
[3] C DAC, Bangalore, Karnataka, India
来源
ADVANCED COMPUTING AND SYSTEMS FOR SECURITY, VOL 1 | 2016年 / 395卷
关键词
Cloud computing; Authentication issues; Single sign-on; SAML; Mobile authentication;
D O I
10.1007/978-81-322-2650-5_12
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing an emerging computing model having its roots in grid and utility computing is gaining increasing attention of both the industry and laymen. The ready availability of storage, compute, and infrastructure services provides a potentially attractive option for business enterprises to process and store data without investing on computing infrastructure. The attractions of Cloud are accompanied by many concerns among which Data Security is the one that requires immediate attention. Strong user authentication mechanisms which prevent illegal access to Cloud services and resources are one of the core requirements to ensure secure access. This paper proposes a user authentication framework for Cloud which facilitates authentication by individual service providers as well as by a third party identity provider. The proposed two-factor authentication protocols uses password as the first factor and a Smart card or Mobile Phone as the second factor. The protocols are resistant to various known security attacks.
引用
收藏
页码:183 / 202
页数:20
相关论文
共 50 条
[41]   Cloud based Secure and Privacy Enhanced Authentication & Authorization Protocol [J].
Khalid, Umer ;
Ghafoor, Abdul ;
Irum, Misbah ;
Shibli, Muhammad Awais .
17TH INTERNATIONAL CONFERENCE IN KNOWLEDGE BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS - KES2013, 2013, 22 :680-688
[42]   Implementation of Secure Authentication Scheme and Access Control in Cloud Computing [J].
Pawar, Prativesh ;
Sheikh, Rashid .
PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
[43]   Quantum Key Distribution Approach for Secure Authentication of Cloud Servers [J].
Fatima, Shahin ;
Ahmad, Shish .
INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2021, 11 (03) :19-32
[44]   Making data in cloud secure and usable: fully homomorphic encryption with symmetric keys [J].
Sharma, Iti ;
Gupta, C. P. .
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2015, 14 (04) :379-399
[45]   Secure authentication framework for cloud-based toll payment message dissemination over ubiquitous VANETs [J].
Safi, Qamas Gul Khan ;
Luo, Senlin ;
Pan, Limin ;
Liu, Wangtong ;
Yan, Guangluo .
PERVASIVE AND MOBILE COMPUTING, 2018, 48 :43-58
[46]   ASMCC+: A Secure Authentication Scheme for Mobile Cloud Computing Environment Based on Zero Trust Architecture [J].
Hossain, Md Jakir ;
Seid, Abegaz Mohammed ;
Abishu, Hayla Nahom ;
Dharejo, Fayaz Ali ;
Jhaveri, Rutvij H. ;
Erbad, Aiman ;
Alathbah, Moath .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (03) :6236-6249
[47]   Design of Multiple Share Creation with Optimal Signcryption based Secure Biometric Authentication System for Cloud Environment [J].
Prabhu D. ;
Vijay Bhanu S. ;
Suthir S. .
International Journal of Computers and Applications, 2022, 44 (11) :1047-1055
[48]   Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment [J].
Cui, Jie ;
Zhang, Xiaoyu ;
Zhong, Hong ;
Zhang, Jing ;
Liu, Lu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 (15) :1654-1667
[49]   BAMCloud: a cloud based Mobile biometric authentication framework [J].
Kashish Ara Shakil ;
Farhana Javed Zareen ;
Mansaf Alam ;
Suraiya Jabin .
Multimedia Tools and Applications, 2023, 82 :39571-39600
[50]   Two-factor authentication framework for private cloud [J].
Gordin, Ionel ;
Graur, Adrian ;
Potorac, Alin .
2019 23RD INTERNATIONAL CONFERENCE ON SYSTEM THEORY, CONTROL AND COMPUTING (ICSTCC), 2019, :255-259