A Secure Two‐Factor Authentication Framework in Cloud Computing

S Kaur, G Kaur, M Shabaz - Security and Communication …, 2022 - Wiley Online Library
Cloud computing technology has brought tremendous evaluation in the arena of IT
(information technology). This technology paves the path of starting business with lowest …

[PDF][PDF] Two factor authentication for cloud computing

S Lee, I Ong, HT Lim, HJ Lee - Journal of information and …, 2010 - koreascience.kr
The fast-emerging of cloud computing technology today has sufficiently benefited its wide
range of users from individuals to large organizations. It carries an attractive characteristic by …

Strengthening cloud security: an innovative multi-factor multi-layer authentication framework for cloud user authentication

AM Mostafa, M Ezz, MK Elbashir, M Alruily… - Applied Sciences, 2023 - mdpi.com
Cloud multi-factor authentication is a critical security measure that helps strengthen cloud
security from unauthorized access and data breaches. Multi-factor authentication verifies …

A Robust IoT‐Based Three‐Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure

F Wang, G Xu, G Xu, Y Wang… - … and Mobile Computing, 2020 - Wiley Online Library
With the development of Internet of Things (IoT) technologies, Internet‐enabled devices
have been widely used in our daily lives. As a new service paradigm, cloud computing aims …

[PDF][PDF] SecAuthn: provably secure multi-factor authentication for the cloud computing systems

S Nagaraju, L Parthiban - Indian Journal …, 2016 - sciresol.s3.us-east-2.amazonaws …
Cloud computing is an advanced resource pooling framework which delivers an economical
and more reliable Information and Communications Technology (ICT) solutions to the …

[PDF][PDF] Advanced Authentication Mechanisms for Identity and Access Management in Cloud Computing.

A Alsirhani, M Ezz, AM Mostafa - Computer Systems Science & …, 2022 - cdn.techscience.cn
Identity management is based on the creation and management of user identities for
granting access to the cloud resources based on the user attributes. The cloud identity and …

A new secure authentication scheme for cloud computing environment

S Namasudra, P Roy - Concurrency and Computation: Practice …, 2017 - Wiley Online Library
Cloud computing is an emerging computing area that allows on‐demand, scalable, flexible,
and low‐cost services to the users. In cloud computing, access control and security are two …

Authentication methods in cloud computing: A survey

M Babaeizadeh, M Bakhtiari… - Research Journal of …, 2015 - airitilibrary.com
This study presents a review on the various methods of authentication in cloud environment.
Authentication plays an important role in security of Cloud Computing (CC). It protects Cloud …

A systematic survey of multi-factor authentication for cloud infrastructure

SP Otta, S Panda, M Gupta, C Hota - Future Internet, 2023 - mdpi.com
The unauthorized usage of various services and resources in cloud computing is something
that must be protected against. Authentication and access control are the most significant …

Authentication in Cloud Computing: Open Problems

Z Khudoykulov, A Karimov… - … on Electronics and …, 2023 - ieeexplore.ieee.org
An authentication mechanism plays an essential role in access control. Authentication
methods vary depending on the environment used, and many authentication methods are …