[引用][C] Multi-factor authentication security framework in cloud computing

P Soni, M Sahoo - International Journal of Advanced Research in …, 2015

[PDF][PDF] A Survey on Various Security Techniques Used For Authentication

A Pal, M Bhatt - academia.edu
Cloud computing is an emerging technology in the current time, but risks associated with this
new technology and delivery model is not yet well understood. Because of the attractive …

[PDF][PDF] Multi-Tier Authentication Scheme to Enhance Security in Cloud Computing

KSRV Satish, MS Das - IJRAR (International Journal of Research …, 2019 - researchgate.net
The goal of this work is to demonstrate the design of a more advanced and secure
authentication mechanism for executing secure financial transactions over the Internet …

[PDF][PDF] Review of an Enhanced Authentication Strategy for Multiservice Authorization over Mobile Cloud

MFM Shelke, PD Soni - … Journal on Recent and Innovation Trends in …, 2014 - academia.edu
Cloud computing has changed the corporate as well as educational industry since it was
introduced. The cloud computing is basically cost effective, convenient and on demand …

An Innovative Authentication Model for the Enhancement of Cloud Security

FK Mupila, H Gupta - Innovations in Computer Science and Engineering …, 2021 - Springer
Cloud computing provides different types of services deployed in different models; thus, its
security has become a paramount concern in the IT field. In this paper, a conceptual …

[PDF][PDF] Authentication techniques in cloud and mobile cloud computing

M Hasan, MH Riaz, MA Rahman - International Journal of …, 2017 - researchgate.net
A major challenge in cloud and mobile cloud computing is to ensure security and privacy of
user's personal information (eg, financial data, health record, location information) from …

A survey on different authentication schemes in cloud computing environment

S Sudha, SS Manikandasaran - International Journal of …, 2019 - indianjournals.com
Cloud computing technology has been a new buzzword in the IT industry and expecting a
new horizon for the coming world and it is also considered as a pinnacle of computing …

[PDF][PDF] User Authentication in Cloud Computing-Using Seed Chain Based One Time Password (OTP)

D Bhattacharya - Citeseer
Cloud computing has emerged as a popular model in computing world to support
processing large volumetric data using clusters of commodity computers. It is the latest effort …

Controlling user access to cloud-connected mobile applications by means of biometrics

G Fenu, M Marras - IEEE Cloud Computing, 2018 - ieeexplore.ieee.org
Cloud-connected mobile applications are becoming a popular solution for ubiquitous access
to online services, such as cloud data storage platforms. The adoption of such applications …

[PDF][PDF] MULTI-FACTOR AUTHENTICATION FOR CLOUD

S Gudimetla - International Research Journal of Modernization in …, 2024 - researchgate.net
As cloud computing evolves and new technology emerges, there is a rising concern around
cloud storage security, considered one of the top issues. In this article, the author covers the …