A Study on Authentication Issues in Cloud Computing Environment

Authors

  • Kumbhakar D BCA Department, Vivekananda Mahavidyalaya, Hooghly, West Bengal, India
  • Karforma S Department of Computer Science, The University of Burdwan, Golapbag, Bardhaman ,West Bengal, India

Keywords:

Cloud Computing, Authentication Issues, Research Issues and Challenges

Abstract

Cloud computing is the new emerging technology and its real trends toward massively scalable various computing services. Cloud computing services are used widely to foster the business volume of an organization or industry based on delivery and consumption of everything from storage to computing management services with minimum effort. Regarding to this importance, the service providers of this technology needs to address many issues related to the cloud computing environment security issues like privacy, authentication and integrity issues etc. Many researchers worked on these issues and provide the possible mechanisms to resolve the issues. However our paper represents a critical study on authentication issues in cloud computing environment.

References

[1] Michael Cooney,”Gartner:How big trends in security, mobile, big data and cloud computing will change IT” oct-30,2012.

[2] National Institute of Standards and Technology, U.S. Department of Commerce,”NIST Cloud Computing Program “ sp 500-322.

[3] Paul A. Strassmann, the former Director of Defense Information, U.S. Department of Defense,” Problems with authentication ” Apr.-2002.

[4] A. A. Yassin, H. Jin, Ayad Ibrahim, Weizhong Qiang and Deqing Zou,” Efficient Password-based Two Factors Authentication in Cloud Computing”, International Journal of Security and Its Applications ,Vol. 6, No. 2, April, 2012.

[5] A. Varghese, Er. D. Mathews,”Securing SMS based approach for two factor authentication”,IJRCCT,pp.25-28,2014.

[6] K. Wong, M. Kim,” Towards Biometric – based Authentication for Cloud Computing “,In Proceedings of the 2nd International Conference on Cloud Computing and Services Science, pages 501-510, 2012.

[7] A. Singh, Dr. M. Bala, S. Kaur, “Classification of data using multi-level authentication in cloud computing” , International Education & Research Journal,Vol.3, Issue.5, pp.114-117,May-2017.Education& Research Journ

[8] A. Krishna K, B. A S, “ Authentication Model for Cloud Computing using Single Sign –on”, International Journal of Advanced Computational Engineering and Networking, Volume-2, Issue-12, pp.55-60, Dec.-2014

[9] H. Chang, E. Choi, “ User Authentication in cloud computing “, Springer,CCSI-151,pp.338-342, 2011.

[10] J. Chhetiza, N. Kumar, “ A Survey of Security Issues and Authentication Mechanism in Cloud Environment with Focus on Multifactor Authentication “, International Journal of Advanced Research in Computer Science and Software Engineering “, vol.6, Issue.5, pp.792-798, 2016.

[11] S. Y. Lim, M.L. Kiah, T. F.Ang, “ Security Issues and Future Challenges of Cloud Service Authentication “,Acta Polytechnica Hungarica, vol.14, No.2, 2017.

[12] M. Ahmadi, M. vali, F. Moghaddam, A. Hakemi, K. Madadipouya,” A Reliable User Authentication and Data Protection Model in Cloud Computing Environments”, ICISCA, 2015.

[13] S.M. Barhate, Dr. M.P.Dhore, “ User Authentication Issues in Cloud Computing “, IOSR-JCE, pp.30-35,2016.

[14] S. Singla, J. Sigh, “ Cloud Data Security using Authentication and Encryption Technique “ ,Global Journal of Computer Science and Technology , vol.13,Issue .3, Ver. 1.0, 2013.

[15] R. Gajula,Dr. A.M.Qyser, N. Rajender,” Combining Two Factor Authentication and Public Key Encryption to Ensure the Authentication in Cloud Computing”,International Journal of Recent Trends in Engineering & Research, pp.118-121,2017.

[16] S.A. Adam, A. Yousif, M.B. Bashir, “ Multilevel Authentication Scheme for Cloud Computing “,International Journal of Grid and Distributed Computing, Vol. 9, No. 9 , pp.205-212,2016.

[17] B. Sumitra, C.R.Pethuru, M.Misbahuddin, “A Survey of Cloud Authentication Attacks and Solutions Approaches”, International Journal of Innovative Research in Computer and Communication Engineering “ Vol.2, Issue .10, pp.6245-6253, 2014.

Downloads

Published

2025-11-24

How to Cite

[1]
D. Kumbhakar and S. Karforma, “A Study on Authentication Issues in Cloud Computing Environment”, Int. J. Comp. Sci. Eng., vol. 7, no. 1, pp. 138–142, Nov. 2025.