[PDF][PDF] Attribute based multifactor authentication for cloud applications

TL Praveena, V Ramachandran - International Journal of …, 2013 - researchgate.net
Online information maintenance through cloud applications allows users to store, manage,
control and share their information with other users as well as Cloud service providers …

A Contemporary Cloud-based Dynamic Authentication System for Mobile Applications

S Philomin, S Srinivasulu, M Abirami… - … Computing and Data …, 2022 - ieeexplore.ieee.org
For a variety of reasons, this identification strategy plans several compensations over
outdated techniques including ID cards (tokens) or PIN statistics (passwords) such as, i) The …

An Enhanced Multifactor Authentication Model For Cloud Computing

C Singh - 2019 - shodhganga.inflibnet.ac.in
newlineAuthentication is one of the key aspects that establish the information security. When
a newlineuser is to be authenticated in a cloud environment, the deployment of a strong …

Strong authentication: Closing the front door to prevent unauthorised access to cloud resources

TV Raphiri, MT Dlamini, H Venter - ICCWS 2015 10th …, 2015 - books.google.com
Cloud computing is a computing paradigm where IT resources such as applications,
software and hardware are made available over the Internet. However, inadequate …

Analysis of Authentication Techniques Adopted by End Users in Real-Life Cloud Implementation

B Khimani, K Patel - Proceedings of International Conference on ICT for …, 2016 - Springer
Security and privacy concerns when using cloud computing services are similar to those of
the traditional noncloud services. Cloud Computing represents dynamic area during present …

[PDF][PDF] Architecture of Three Factor Authentications for Secured Access in Cloud Environment

TN Prakash, TK Vani - researchgate.net
Cloud computing becomes an evolving technology which will have an important influence in
IT Organizations. Security in cloud computing is usually procedures and controlbased …

Efficient privacy-aware authentication scheme for mobile cloud computing services

D He, N Kumar, MK Khan, L Wang… - IEEE Systems …, 2016 - ieeexplore.ieee.org
With the exponential increase of the mobile devices and the fast development of cloud
computing, a new computing paradigm called mobile cloud computing (MCC) is put forward …

A Strong Single Sign on User Authentication Scheme without Verifier Table for Cloud Based Services

B Sumitra, M Mohammed… - Proceedings of the …, 2015 - search.proquest.com
Cloud computing is an emerging computing paradigm that offers computational facilities and
storage as services dynamically on demand basis via the Internet. The ability to scale …

Secure authentication system for hybrid cloud service in mobile communication environments

JM Kim, JK Moon - International Journal of Distributed …, 2014 - journals.sagepub.com
We want more cloud service because of computer resource reuse, server device cost, and
space problems. So, related researchers suggest private cloud service to solve these …

[PDF][PDF] Cloud-centric Authentication Systems: Dependable or Secure

D CHATTARAJ, M SARMA - researchgate.net
Recent technological advancement of emerging computing platforms viz; Cloud computing,
Edge computing and Big Data demand a dependable and secure authentication framework …