[PDF][PDF] Assessment of Strong User Authentication Schemes in Cloud based Computing

M Mathur, N Saraswat - academia.edu
Studies indicate that digital identity fraud is still on the rise, with an increase in complexity
(that is," phishing,"" man-in-the-middle," DNS poisoning, malware, social engineering, and …

Continuous Cloud User Authentication By Efficient Facial Recognition

SP Otta, S Kolipara, VK Malhotra… - … and Networks (CINE …, 2022 - ieeexplore.ieee.org
Designing any cloud-based application typically includes a vital step for securing user
identification and access control. A potential approach to increase security against mali …

[PDF][PDF] Prior Authentication Approach to Enhance Security in CloudComputing

PM Jyosthna - ijecce.org
Now a days Cloud computing is an upcoming Technology. Cloud allows users to access
and share resources such as software, platform and infrastructure by means of virtualization …

Analyzing authentication patterns for cloud services

KK Liyanaarachchi - IEEE Potentials, 2018 - ieeexplore.ieee.org
Cloud services are very popular among enterprises; most businesses use multiple cloud
services. At the same time, some enterprises acquire, merge, and partner with other …

[引用][C] OpenID based user authentication scheme for multi-clouds environment

Y Wi, J Kwak - Journal of Digital Convergence, 2013 - The Society of Digital Policy and …

[PDF][PDF] A literature on Common Cloud Authentication Techniques

K Rai - 2015 - ijcssca.co.in
With promising benefits, cloud computing has also the issue of privacy and security, which is
related to need for enabling access control to only authorize a user. Knowing that it has …

Authentication in Cloud Computing: Open Problems

Z Khudoykulov, A Karimov… - … on Electronics and …, 2023 - ieeexplore.ieee.org
An authentication mechanism plays an essential role in access control. Authentication
methods vary depending on the environment used, and many authentication methods are …

[PDF][PDF] A lightweight authentication scheme for mobile cloud computing

MR Momeni - International Journal of Computer Science and …, 2014 - academia.edu
The ABI Research believes that the number of mobile cloud computing users is expected to
grow from 42.8 million (1.1% of total mobile users) in 2008 to 998 million (19% of total …

Authentication issues and techniques in cloud computing security: A review

A Sharma, B Keshwani, P Dadheech - Proceedings of International …, 2019 - papers.ssrn.com
Cloud Computing is a service which is rapidly increasing its growth in IT industry in recent
years. The privacy and security is main challenging issue for the cloud users as well …

[引用][C] Authentication in the Cloud: A risk-based approach

M Dlamini, H Venter, J Eloff, Y Mitha - University of Pretoria, 2012