Research Article | OPEN ACCESS
Authentication Methods in Cloud Computing: A Survey
1Mahnoush Babaeizadeh, 2Majid Bakhtiari and 1Alwuhayd Muteb Mohammed
1Department of Computer Science, Faculty of Computing, Universiti Teknologi Malaysia,
Skudai 81310, Johor, Malaysia
2Advanced Informatics School, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, Malaysia
Research Journal of Applied Sciences, Engineering and Technology 2015 8:655-664
Received: November ‎13, ‎2014 | Accepted: January ‎27, ‎2015 | Published: March 15, 2015
Abstract
This study presents a review on the various methods of authentication in cloud environment. Authentication plays an important role in security of Cloud Computing (CC). It protects Cloud Service Providers (CSP) against various types of attacks, where the aim is to verify a user’s identity when a user wishes to request services from cloud servers. There are multiple authentication technologies that verify the identity of a user before granting access to resources.
Keywords:
Authentication, biometric, cloud computing, information security, keystroke authentication, security and privacy,
References
-
Abhishek, K., S. Roshan, P. Kumar and R. Ranjan, 2013. A comprehensive study on multifactor authentication schemes. Adv. Comput. Inform. Technol., 177: 561-568.
CrossRef -
Acar, T., M. Belenkiy and A. Küpçü, 2013. Single password authentication. IACR Cryptology ePrint Archive, pp: 167.
-
Acucmez, O., A. Latifi, J.P. Seifert and X. Zhang, 2008. A trusted mobile phone prototype. Proceeding of 5th IEEE Consumer Communications and Networking Conference (CCNC, 2008).
-
Akyildiz, E. and M. Ashraf, 2014. An overview of trace based public key cryptography over finite fields. J. Comput. Appl. Math., 259: 599-621.
CrossRef -
Al-Shebani, Q., P. Premarante and P.J. Vial, 2013. Embedded door access control systems based on face recognition: A survey. Proceeding of 7th International Conference on Signal Processing and Communication Systems (ICSPCS, 2013), pp: 1-7.
CrossRef -
Anzaku, E.T., H. Sohn and Y.M. Ro, 2010. Multi-factor authentication using fingerprints and user-specific random projection. Proceeding of 12th International Asia-Pacific Web Conference (APWEB, 2010), pp: 415-418.
CrossRef -
Arriaga, R.I. and S. Vempala, 1999. An algorithmic theory of learning: Robust concepts and random projection. Proceeding of 40th Annual Symposium on Foundations of Computer Science, pp: 616-623.
CrossRef -
Ayurzana, O., B. Pumbuurei and H. Kim, 2013. A study of hand-geometry recognition system. Proceeding of 8th International Forum on Strategic Technology (IFOST, 2013), 2: 132-135.
CrossRef -
Babaeizadeh, M., M. Bakhtiari and M. AizainiMaarof, 2014a. Keystroke dynamic authentication in mobile cloud computing. Int. J. Comput. Appl., 90(1): 29-36.
CrossRef -
Babaeizadeh, M., M. Bakhtiari and M.A. Maarof, 2014b. Authentication method through keystrokes measurement of mobile users in cloud environment. Int. J. Adv. Soft Comput. Appl., 6(3).
-
Banyal, R.K., P. Jain and V.K. Jain, 2013. Multi-factor authentication framework for cloud computing. Proceeding of 5th International Conference on Computational Intelligence, Modelling and Simulation (CIMSim), pp: 105-110.
CrossRef -
Behl, A., 2011. Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation. Proceeding of World Congress on Information and Communication Technologies (WICT, 2011), pp: 217-222.
-
Bhatt, Sh. and T. Santhanam, 2013. Keystroke dynamics for biometric authentication-a survey. Proceeding of International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME), pp: 17-23.
CrossRef -
Bhattacharyya, D., R. Ranjan, A. FarkhodAlisherov and M. Choi, 2009. Biometric authentication: A review. Int. J. u-and e-Serv. Sci. Technol., 2(3): 13-28.
-
Bouayad, A., A. Blilat, N. El HoudaMejhed and M. El Ghazi, 2012. Cloud computing: Security challenges. Proceeding of IEEE Colloquium in Information Science and Technology (CIST, 2012), pp: 26-31.
-
Brainard, J.G., A. Juels, R.L. Rivest, M. Szydlo and M. Yung, 2006. Fourth-factor authentication: Somebody you know. Proceeding of ACM Conference on Computer and Communications Security, pp: 168-178.
CrossRef -
Cardoso, Â. and A. Wichert, 2012. Iterative random projections for high-dimensional data clustering. Pattern Recogn. Lett., 33(13): 1749-1755.
CrossRef -
Chen, D.R. and H. Li, 2013. Convergence rates of learning algorithms by random projection. Appl. Comput. Harmon. A., 37(1): 36-51.
CrossRef -
Chen, J., G. Wu, L. Shen and Z. Ji, 2011. Differentiated security levels for personal identifiable information in identity management system. Expert Syst. Appl., 38(11): 14156-14162.
CrossRef -
Choras, M. and M. Piotr, 2007. Keystroke dynamics for biometric identification. In: Beliezynski, B. and et al. (Eds.): ICANNGA 2007. Part 2, LNCS 4432, Springer-Verlag, Berlin, Heidelberg, pp: 424-431.
CrossRef -
Cemal, K. and C. Iki, 2011. A personal identification system using retinal vasculature in retinal fundus images. Expert Syst. Appl., 38(11): 13670-13681.
CrossRef -
Clarke, N.L. and S.M. Furnell, 2005. Authentication of users on mobile telephones-A survey of attitudes and practices. Comput. Secur., 24(7): 519-527.
CrossRef -
Crawford, H., R. Karen and S. Tim, 2013. A framework for continuous, transparent mobile device authentication. Comput. Secur., 39: 127-136.
CrossRef -
Cui, B. and T. Xue, 2009. Design and realization of an intelligent access control system based on voice recognition. Comput. Commun. Control Manage., 1: 229-232.
CrossRef -
De Clercq, J., 2002. Single sign-on architectures. Infrastructure Secur., 2437: 40-58.
CrossRef -
Dinesha, H.A. and V.K. Agrawal, 2012. Multi-level authentication technique for accessing cloud services. Proceeding of International Conference on Computing, Communication and Applications (ICCCA, 2012), pp: 1-4.
CrossRef -
Duta, N., 2009. A survey of biometric technology based on hand shape. Pattern. Recogn., 42(11): 2797-2806.
CrossRef -
Ekberg, J.E., 2007. Mobile Trusted Module (MTM) -an introduction.
Direct Link -
Ferrer, M.A., A. Morales, C.M. Travieso and J.B. Alonso, 2007. Low cost multimodal biometric identification system based on hand geometry, palm and finger print texture. Proceeding of 41st Annual IEEE International Carnahan Conference on Security Technology, pp: 52-58.
CrossRef -
Gordon, S.D., J. Katz, R. Kumaresan and A. Yerukhimovich, 2010. Authenticated broadcast with a partially compromised public-key infrastructure. In: Dolev, S. and et al. (Eds.), SSS 2010. LNCS 6366, Springer-Verlag, Berlin Heidelberg, pp: 144-158.
CrossRef -
Grossschadl, J., T. Vejda and D. Page, 2008. Reassessing the TCG specifications for trusted computing in mobile and embedded systems. Proceeding of IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2008), pp: 84-90.
CrossRef -
Gurav, S.M., L.S. Gawade, P.K. Rane and N.R. Khochare, 2014. Graphical password authentication: Cloud securing scheme. Proceeding of IEEE Electronic Systems, Signal Processing and Computing Technologies (ICESC, 2014), pp: 479-483.
-
Haidar, A.N. and A.E. Abdallah, 2009. Formal modelling of pki based authentication. Electron. Notes Theor. Comput. Sci., 235: 55-70.
CrossRef -
Jafri, R. and H.R. Arabnia, 2009. A survey of face recognition techniques. J. Inform. Process. Syst., 5(2): 41-68.
CrossRef -
Jain, A.K., S. Prabhakar, L. Hong and S. Pankanti, 2000. Filterbank-based fingerprint matching. IEEE T. Image Process., 9(5): 846-859.
CrossRef -
Jarng, S.S., 2011. HMM voice recognition algorithm coding. Proceeding of International Conference on Information Science and Applications (ICISA, 2011), pp: 1-7.
-
Jeong, H. and E. Choi, 2012. User authentication using profiling in mobile cloud computing. AASRI Procedia, 2: 262-267.
CrossRef -
Jiang, X.C. and J.D. Zheng, 2014. An indirect fingerprint authentication scheme in cloud computing. Appl. Mech. Mater., 484: 986-990.
CrossRef -
Jivanadham, L.B., A.K.M. Islam, Y. Katayama, S. Komaki and S. Baharun, 2013. Cloud Cognitive Authenticator (CCA): A public cloud computing authentication mechanism. Proceeding of International Conference on Informatics, Electronics and Vision (ICIEV, 2013), pp: 1-6.
-
Jog, M. and M. Madiajagan, 2012. Cloud computing: Exploring security design approaches in infrastructure as a service. Proceeding of International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM, 2012), pp: 156-159.
-
Jula, A., E. Sundararajan and Z. Othman, 2014. Cloud computing service composition: A systematic literature review. Expert Syst. Appl., 41(8): 3809-3824.
CrossRef -
Kar, S., S. Hiremath, D.G. Joshi, V.K. Chadda and A. Bajpai, 2006. A multi-algorithmic face recognition system. Adv. Comput. Commun., 3: 321-326.
CrossRef -
Karnan, M., M. Akila and N. Krishnaraj, 2011. Biometric personal authentication using keystroke dynamics: A review. Appl. Soft. Comput., 11(2): 1565-1573.
CrossRef -
Khalid, U., A. Ghafoor, M. Irum and M.A. Shibli, 2012. Cloud based secure and privacy enhanced authentication and authorization protocol. Procedia Comput. Sci., 22: 680-688.
CrossRef -
Kim, M., H. Ju, Y. Kim, J. Park and Y. Park, 2010. Design and implementation of mobile trusted module for trusted mobile computing. IEEE T. Consum. Electr., 56(1): 134-140.
CrossRef -
Kong, A., D. Zhang and M. Kamel, 2009. A survey of palmprint recognition. Pattern Recogn., 42(7): 1408-1418.
CrossRef -
Liu, M., 2010. Fingerprint classification based on Adaboost learning from singularity features. Pattern. Recogn., 43(3): 1062-1070.
CrossRef -
Lone, M.A., S.M. Zakariya and R. Ali, 2011. Automatic face recognition system by combining four individual algorithms. Proceeding of International Conference on Computational Intelligence and Communication Networks (CICN), pp: 222-226.
CrossRef -
Manvi, S.S. and G. Krishna Shyam, 2013. Resource management for infrastructure as a Service (IaaS) in cloud computing: A survey. J. Netw. Comput. Appl., 41: 424-440.
CrossRef -
Pearson, S., Y. Shen and M. Mowbray, 2009. A privacy manager for cloud computing. In: Jaatun, M.G., G. Zhao and C. Rong (Eds.), CloudCom 2009. LNCS 5931, Springer, Berlin, Heidelberg, pp: 90-106.
CrossRef -
Pointcheval, D. and S. Zimmer, 2008. Multi-factor Authenticated Key Exchange. In: Bellovin, S.M. (Eds.), ACNS. Springer-Verlag, Berlin, Heidelberg, pp: 277-295.
CrossRef -
Polat, Ö. and T. Yildirim, 2008. Hand geometry identification without feature extraction by general regression neural network. Expert Syst. Appl., 34(2): 845-849.
CrossRef -
Popovic, K. and Z. Hocenski, 2010. Cloud computing security issues and challenges. Proceeding of the 33rd International Convention on MIPRO, 2010.
-
Qiao, Y., X. Jiang, H.W. Lin and J.S. Pan, 2012. Efficient identity based threshold proxy signature scheme in cloud environment. Proceeding of International Conference on Information Security and Intelligence Control (ISIC, 2012), pp: 53-56.
CrossRef -
Radha, V. and D.H. Reddy, 2012. A survey on single sign-on techniques. Procedia. Technol., 4: 134-139.
CrossRef -
Ramgovind, S., M.M. Eloff and E. Smith, 2010. The management of security in cloud computing. Proceeding of Information Security for South Africa (ISSA), pp: 1-7.
-
Revar, A.G. and M.D. Bhavsar, 2011. Securing user authentication using single sign-on in cloud computing. Proceeding of International Conference on Engineering (NUiCONE), pp: 1-4.
CrossRef -
Ricco, S. and M. Chen, 2009. Classification of scan location in retinal optical coherence tomography. Proceeding of Biomedical Imaging: From Nano to Macro (ISBI'09), pp: 1031-1034.
-
Schmidt, A.U., N. Kuntze and M. Kasper, 2008. On the deployment of mobile trusted modules. Proceeding of IEEE Wireless Communications and Networking Conference (WCNC, 2008), pp: 3169-3174.
CrossRef -
Sharma, P., S.K. Sood and S. Kaur, 2011. Security issues in cloud computing. In: Mantri, A. (Ed.), High Performance Architecture and Grid Computing. Springer-Verlag, Berlin, Heidelberg, pp: 36-45.
CrossRef PMCid:PMC3263158 -
Sidlauskas, D.P. and S. Tamer, 2008. Hand geometry recognition. In: Jain, A.K., P. Flynn and A.A. Ross (Eds.), Handbook of Biometrics. Springer, US, Boston, pp: 91-107.
CrossRef -
Su, S. and S. Lü, 2012. A public key cryptosystem based on three new provable problems. Theor. Comput. Sci., 426: 91-117.
CrossRef -
Subashini, S. and V. Kavitha, 2011. A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl., 34(1): 1-11.
CrossRef -
Wang, X., G. Fangxia and M. Jian-feng, 2012. User authentication via keystroke dynamics based on difference subspace and slope correlation degree. Dig. Signal. Process., 22(5): 707-712.
CrossRef LI id="Ref65">
Winkler, 2011. Cloud computing architecture in securing the cloud. Syngress, pp: 29-53.
-
Wu, L., S. Kumar Garg and R. Buyya, 2012. SLA-based admission control for a software-as-a-service provider in cloud computing environments. J. Comput. Syst. Sci., 78(5): 1280-1299.
CrossRef -
Xie, G. and B. Yao, 2013. Cloud storage identity design based on fingerprint identification. Proceeding of 6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), 1: 569-572.
CrossRef -
Yassin, A.A., H. Jin, A. Ibrahim and D. Zou, 2012. Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing. Proceeding of 2nd International Conference on Cloud and Green Computing (CGC, 2012), pp: 282-289.
CrossRef -
Zissis, D. and D. Lekkas, 2012. Addressing cloud computing security issues. Future. Gener. Comp. Sy., 28: 583-592.
CrossRef -
Ziyad, S. and A. Kannammal, 2014. A Multifactor Biometric Authentication for the Cloud. Adv. Intell. Syst. Comput., 246: 395-403.
CrossRef
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|