Review on authentication mechanisms in cloud computing

  • Authors

    • D Sumathi
    • Sireesha Jasti
    https://doi.org/10.14419/ijet.v7i3.29.19184
  • Authentication Mechanisms, Cloud Computing, Mutual Authentication Scheme, Security Issues.
  • Cloud computing is one of the most significant revolutionary technologies that provide services from computing infrastructures, applications, and platforms to customers for their personal coalition whenever and wherever needed. Security is considered to be the most important key component in the challenges of cloud computing field. This work discusses about the first level key challenges of security- Authentication. Many authentication schemes have been proposed earlier. But all those schemes work as an entry level for service requisition. When the consumers face any problems during the service availability, then both the consumers and service providers need a quick outlook to the SLA. Based on the severity level of the issue, the service providers need permission to access the service area rented by the consumer. This work provides the critics and reviews of authentication mechanisms that have been carried out earlier. In addition, it also provides an overview of authentication mechanisms carried out by service providers and a comparison of various authentication mechanisms has been discussed.

     

     

     
  • References

    1. [1] NIST Definition. [Online]. Available: www.nist.gov/itl/cloud/upload/cloud-def-v15.pdf Cloud Computing services & comparisons. [Online]. Available: http://www.thbs.com/downloads/Comparison of Cloud computing services.pdf.

      [2] Sabout Nagaraju, Latha Parthiban, SecAuthn: Provably Secure Multi-Factor Authentication for the Cloud Computing Systemsâ€, Indian Journal of Science and Technology, Vol 9(9), March 2016.

      [3] L. Lamport, Password authentication with insecure communication, Communications of the ACM 24 770–772, 1981.

      [4] M. S. Hwang and L. H. Li, A new remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 28-30, 2000.

      [5] H. Y. Chien, J. K. Jan, and Y. M. Tseng, “An efficient and practical solution to remote authentication: smart card,†Computers and Security, 21(4):372–375, 2002.

      [6] T. H. Chen and J. C. Huang, “A novel user-participating authentication scheme,†The Journal of Systems and Software, 83(5):861–867, 2010.

      [7] Chow, Markus Jocobsson, Ryusuke Masuoka, Jesus Molina, Yuan Niu, Elaine Shi, Zhexuan Song, “Authentication in the Clouds, A Framework and its Application to Mobile Users. CCSW‟10, October 8, Chicago, Illinois, USA, 2010.

      [8] J. Kim and S. Hong, 2011. One-Source Multi-Use System having Function of Consolidated User Authentication, YES-ICUC, 2011.

      [9] Choudhury, A.; Kumar, P.; Sain, M.; Lim, H. and Hoon Jae-Lee, "A Strong User Authentication Framework for Cloud Computing", Services Computing Conference (APSCC), 2011 IEEE Asia-Pacific, pp.110-115, 12-15 Dec. 2011.

      [10] Hyosik Ahn, Hyokyung Chang, Changbok Jang, Euiin Choi,†User Authentication Platform using Provisioning in Cloud Computing Environmentâ€, ACN : Advanced Communication and Networking pp 132-138,2011.

      [11] Z. Shen, L. Li, F. Yan, X. Wu, 2010. Cloud Computing System Based on Trusted Computing Platform.International Conference on Intelligent Computation Technology and Automation (ICICTA). vol 1, pp 942-945,2010

      [12] Quorica, 2009. Buisness Analysis Evolution of Strong Authentication, September 2009.

      [13] Tanvi Naik, Sheetal Koul,†Multi-Dimensional and Multi-Level Authentication Techniquesâ€, International Journal of Computer Applications (0975 – 8887) Volume 75– No.12, August 2013.

      [14] Manjea Kim, Hoon Jeong, Eulin Choi, “Context-aware Platform for User Authentication in Cloud Database Computingâ€, International Conference on Future Information and Technology and Management Science and Engineering, Lecture notes in Information Technology, Vol 14,2012.

      [15] Hao, Z., Zhong, S. and Yu, N. “A timebound ticket-based mutual authentication scheme for cloud computingâ€, International Journal of Computers, Communications and Control, 6(2), pp. 227–235,2011.

      [16] Ravi Singh Pippal, Jaidhar C. D. Shashikala Tapaswi,†Enhanced Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computingâ€, Informatica 37, 149–156, 2013.

      [17] Mahamudul Hasan , Md. Hasnat Riaz , Md. Auhidur Rahman,†Authentication Techniques in Cloud and Mobile Cloud Computingâ€, IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.11, November 2017.

      [18] Amit Verma, Megha Mittal, Bharti Chhabra, “The Mutual Authentication Scheme to detect virtual side channel attack in cloud Computingâ€, International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 3, March 2017.

  • Downloads

  • How to Cite

    Sumathi, D., & Jasti, S. (2018). Review on authentication mechanisms in cloud computing. International Journal of Engineering & Technology, 7(3.29), 319-322. https://doi.org/10.14419/ijet.v7i3.29.19184