[PDF][PDF] A two tier reliable user authentication scheme for cloud environment

A Dhamija, D Dhamija - Int J Comput Appl, 2015 - Citeseer
Authenticating users and establishing their identity is the first most part of any computer
based application or website. This has to be the most significant point from the security …

Two factor authentication using M-pin server for secure cloud computing environment

N Nagar, U Suman - Web-Based Services: Concepts, Methodologies …, 2016 - igi-global.com
Cloud computing is comprised of major demand from the every group of organization
because of easy availability and cost effectiveness. The responsibilities of cloud service …

Lightweight Authentication of Mobile Cloud Computing

SL Green - 2013 - search.proquest.com
Cloud Computing changed the dynamics in the way users and companies use electronic
communications devices. Companies need more mobile people to reach customers, and …

[PDF][PDF] Implementation of user authentication as a service for cloud network

M Shah, AS Shah, I Ijaz - International Journal of Grid and …, 2016 - researchgate.net
There are so many security risks for the users of cloud computing, but still the organizations
are switching towards the cloud. The cloud provides data protection and a huge amount of …

[PDF][PDF] Pattern based user authentication for secure cloud access and storage

PS Kadam, PA Jadhav - International Journal of Recent Scientific …, 2015 - Citeseer
Cloud system environment ensures that user can use highly extensive drivable services
resource over the network as and when required. The main aim of the cloud services is the …

Continuous Cloud User Authentication By Efficient Facial Recognition

SP Otta, S Kolipara, VK Malhotra… - … and Networks (CINE …, 2022 - ieeexplore.ieee.org
Designing any cloud-based application typically includes a vital step for securing user
identification and access control. A potential approach to increase security against mali …

[PDF][PDF] Efficient and Secure Mutual Authentication Scheme in Cloud Computing

AA Yassin, HZ Neima, ZA Abduljabbar… - International Journal of …, 2013 - researchgate.net
Nowadays, cloud computing considers an important topic for small, medium and large e-
commences alike. The security is a constitutive trouble that hinders its widespread adoption …

[PDF][PDF] Framework using Multitenancy Architecture in Cloud Computing

A Wadhwa, S Gupta - International Journal of Computer Applications, 2015 - Citeseer
As we all know Cloud computing is an emerging field in the world of computation and
security of the data must be confined over the network. There are some security issues …

LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment

AYF Alsahlani, A Popa - Journal of Network and Computer Applications, 2021 - Elsevier
Abstract Internet of Things (IoT) is a network of interconnected smart devices which provides
tremendous benefits and can be applied in various fields including, but not limited to …

A MULTILEVEL USER VALIDATION FRAMEWORK FOR ACCESSING CLOUD SERVICES

S Gadde, K Janaki - The journal of contemporary issues in business and …, 2021 - cibgp.com
Cloud computing is a paradigm that offers enormous advantages to cloud users for example,
huge memory, adaptable processing abilities, security to the data and boundless registering …