A Study on Authentication Issues in Cloud Computing Environment
Keywords:
Cloud Computing, Authentication Issues, Research Issues and ChallengesAbstract
Cloud computing is the new emerging technology and its real trends toward massively scalable various computing services. Cloud computing services are used widely to foster the business volume of an organization or industry based on delivery and consumption of everything from storage to computing management services with minimum effort. Regarding to this importance, the service providers of this technology needs to address many issues related to the cloud computing environment security issues like privacy, authentication and integrity issues etc. Many researchers worked on these issues and provide the possible mechanisms to resolve the issues. However our paper represents a critical study on authentication issues in cloud computing environment.
References
[1] Michael Cooney,”Gartner:How big trends in security, mobile, big data and cloud computing will change IT” oct-30,2012.
[2] National Institute of Standards and Technology, U.S. Department of Commerce,”NIST Cloud Computing Program “ sp 500-322.
[3] Paul A. Strassmann, the former Director of Defense Information, U.S. Department of Defense,” Problems with authentication ” Apr.-2002.
[4] A. A. Yassin, H. Jin, Ayad Ibrahim, Weizhong Qiang and Deqing Zou,” Efficient Password-based Two Factors Authentication in Cloud Computing”, International Journal of Security and Its Applications ,Vol. 6, No. 2, April, 2012.
[5] A. Varghese, Er. D. Mathews,”Securing SMS based approach for two factor authentication”,IJRCCT,pp.25-28,2014.
[6] K. Wong, M. Kim,” Towards Biometric – based Authentication for Cloud Computing “,In Proceedings of the 2nd International Conference on Cloud Computing and Services Science, pages 501-510, 2012.
[7] A. Singh, Dr. M. Bala, S. Kaur, “Classification of data using multi-level authentication in cloud computing” , International Education & Research Journal,Vol.3, Issue.5, pp.114-117,May-2017.Education& Research Journ
[8] A. Krishna K, B. A S, “ Authentication Model for Cloud Computing using Single Sign –on”, International Journal of Advanced Computational Engineering and Networking, Volume-2, Issue-12, pp.55-60, Dec.-2014
[9] H. Chang, E. Choi, “ User Authentication in cloud computing “, Springer,CCSI-151,pp.338-342, 2011.
[10] J. Chhetiza, N. Kumar, “ A Survey of Security Issues and Authentication Mechanism in Cloud Environment with Focus on Multifactor Authentication “, International Journal of Advanced Research in Computer Science and Software Engineering “, vol.6, Issue.5, pp.792-798, 2016.
[11] S. Y. Lim, M.L. Kiah, T. F.Ang, “ Security Issues and Future Challenges of Cloud Service Authentication “,Acta Polytechnica Hungarica, vol.14, No.2, 2017.
[12] M. Ahmadi, M. vali, F. Moghaddam, A. Hakemi, K. Madadipouya,” A Reliable User Authentication and Data Protection Model in Cloud Computing Environments”, ICISCA, 2015.
[13] S.M. Barhate, Dr. M.P.Dhore, “ User Authentication Issues in Cloud Computing “, IOSR-JCE, pp.30-35,2016.
[14] S. Singla, J. Sigh, “ Cloud Data Security using Authentication and Encryption Technique “ ,Global Journal of Computer Science and Technology , vol.13,Issue .3, Ver. 1.0, 2013.
[15] R. Gajula,Dr. A.M.Qyser, N. Rajender,” Combining Two Factor Authentication and Public Key Encryption to Ensure the Authentication in Cloud Computing”,International Journal of Recent Trends in Engineering & Research, pp.118-121,2017.
[16] S.A. Adam, A. Yousif, M.B. Bashir, “ Multilevel Authentication Scheme for Cloud Computing “,International Journal of Grid and Distributed Computing, Vol. 9, No. 9 , pp.205-212,2016.
[17] B. Sumitra, C.R.Pethuru, M.Misbahuddin, “A Survey of Cloud Authentication Attacks and Solutions Approaches”, International Journal of Innovative Research in Computer and Communication Engineering “ Vol.2, Issue .10, pp.6245-6253, 2014.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
