scispace - formally typeset
Proceedings ArticleDOI

Multi-factor Authentication Framework for Cloud Computing

Reads0
Chats0
TLDR
The proposed framework provides a feasible and a most efficient mechanism which can closely integrate with the traditional authentication system and shows the close agreement with the standard criteria for security.
Abstract
Cloud computing is a new paradigm to deliver services over the Internet. Data Security is the most critical issues in a cloud computing environment. Authentication is a key technology for information security, which is a mechanism to establish proof of identities to get access of information in the system. Traditional password authentication does not provide enough security for information in cloud computing environment to the most modern means of attacks. In this paper, we propose a new multi-factor authentication framework for cloud computing. The proposed framework provides a feasible and a most efficient mechanism which can closely integrate with the traditional authentication system.The proposed framework is verified by developing Cloud Access Management (CAM) system which authenticates the user based on multiple factors. Also using secret-splitting and encrypted value of arithmetic captcha is innovative factor for user authentication for cloud computing environment. Prototype model for cloud computing own cloud server is implemented using open sources technology. The proposed framework shows the close agreement with the standard criteria for security.

read more

Citations
More filters
Journal ArticleDOI

Intelligent Manufacturing in the Context of Industry 4.0: A Review

TL;DR: This paper provides a comprehensive review of associated topics such as intelligent manufacturing, Internet of Things (IoT)-enabled manufacturing, and cloud manufacturing and describes worldwide movements in intelligent manufacturing.
Journal ArticleDOI

Multi-factor authentication: A survey

TL;DR: The already available and emerging sensors (factor providers) that allow for authenticating a user with the system directly or by involving the cloud are surveyed and a framework for qualifying the missing factors by authenticating the user without disclosing sensitive biometric data to the verification entity is proposed.
Journal ArticleDOI

IoT-enabled smart appliances under industry 4.0: A case study

TL;DR: An industry-led case study demonstrates how to turn conventional appliances to smart products and systems (SPS) by utilising the state-of-the-art Industry 4.0 technologies.
Journal ArticleDOI

Blockchain technology the identity management and authentication service disruptor: A survey

TL;DR: The discovery of this new mechanism disrupted the existing identity management and authentication solutions and by providing a more promising secure platform and the open issues, main challenges and directions highlighted for future work in this area.
References
More filters
ReportDOI

The NIST Definition of Cloud Computing

Peter Mell, +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Journal ArticleDOI

Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility

TL;DR: This paper defines Cloud computing and provides the architecture for creating Clouds with market-oriented resource allocation by leveraging technologies such as Virtual Machines (VMs), and provides insights on market-based resource management strategies that encompass both customer-driven service management and computational risk management to sustain Service Level Agreement (SLA) oriented resource allocation.
Proceedings ArticleDOI

Cloud Computing and Grid Computing 360-Degree Compared

TL;DR: In this article, the authors compare and contrast cloud computing with grid computing from various angles and give insights into the essential characteristics of both the two technologies, and compare the advantages of grid computing and cloud computing.
Journal ArticleDOI

Password authentication with insecure communication

TL;DR: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system.
Journal ArticleDOI

A break in the clouds: towards a cloud definition

TL;DR: The concept of Cloud Computing is discussed to achieve a complete definition of what a Cloud is, using the main characteristics typically associated with this paradigm in the literature.
Related Papers (5)