[PDF][PDF] Preserving privacy in Cloud based applications using two-factor authentication (TOTP/WTP)

PR Anantula, GM Someswar - academia.edu
Security and Privacy are the major concerns in the current trends of cloud environment.
Securing the data and applications from the intruders, Hackers and internal attackers has …

[PDF][PDF] A Survey of Security Issues and Authentication Mechanism in Cloud Environment with Focus on Multifactor Authentication

J Chhetiza, N Kumar - International Journal of Advanced …, 2016 - researchgate.net
Cloud computing provides shared processing resources and data to computers and other
devices on demand over the internet. Any configurable computing resource like, servers …

Authenticating users with multiple levels of validations in a secure Cloud Computing Environment

PR Anantula, GM Someswar - i-manager's Journal on Cloud …, 2016 - search.proquest.com
In the current digital technology world, all the applications are moving into cloud
environment. The biggest challenge is to maintain the security and privacy of the application …

[PDF][PDF] Multi-authentication for cloud security: A framework

S Kumar, A Ganpati - Int. J. Comput. Sci. Eng. Technol, 2014 - ijcset.com
Cloud computing is a multi-tenant computational paradigm that offers an efficient, elastic and
scalable business model for organizations to adopt various information technology (IT) …

A Secure Two‐Factor Authentication Framework in Cloud Computing

S Kaur, G Kaur, M Shabaz - Security and Communication …, 2022 - Wiley Online Library
Cloud computing technology has brought tremendous evaluation in the arena of IT
(information technology). This technology paves the path of starting business with lowest …

Analysis of Authentication Techniques Adopted by End Users in Real-Life Cloud Implementation

B Khimani, K Patel - Proceedings of International Conference on ICT for …, 2016 - Springer
Security and privacy concerns when using cloud computing services are similar to those of
the traditional noncloud services. Cloud Computing represents dynamic area during present …

A 3-level multifactor Authentication scheme for cloud computing

C Singh, D Singh - International Journal of Computer …, 2019 - papers.ssrn.com
The objective of this paper is to propose a secure, user friendly and economical multi-level
authentication scheme that uses multiple factors for gaining access to resource on insecure …

[PDF][PDF] Design and implementation of multi-tier authentication scheme in cloud

M Singh, S Singh - International Journal of Computer Science Issues …, 2012 - Citeseer
The purpose of this paper is to present the design of a secure and more advanced
authentication scheme for executing secure financial transactions over Internet. There has …

[PDF][PDF] Framework using Multitenancy Architecture in Cloud Computing

A Wadhwa, S Gupta - International Journal of Computer Applications, 2015 - Citeseer
As we all know Cloud computing is an emerging field in the world of computation and
security of the data must be confined over the network. There are some security issues …

A Secure Multi Factor Authentication Framework in Cloud Computing

MN Sharphathy, V Sumalatha - 2024 5th International …, 2024 - ieeexplore.ieee.org
Computers perform a major role in our daily lives. To computerize the information in the form
of data in order to make the data efficient and for a long time. As the size of the data …