Authentication in Cloud Computing: Open Problems

Z Khudoykulov, A Karimov… - … on Electronics and …, 2023 - ieeexplore.ieee.org
An authentication mechanism plays an essential role in access control. Authentication
methods vary depending on the environment used, and many authentication methods are …

Architectural design of trusted platform for IaaS cloud computing

UA Kashif, ZA Memon, S Siddiqui… - Cloud Security …, 2019 - igi-global.com
This article describes how the enormous potential benefits provided by the cloud services,
made enterprises to show huge interest in adopting cloud computing. As the service …

An enhanced user authentication framework in cloud computing

H Al-Refai, K Batiha, AM Al-Refai - … Journal of Network Security & Its …, 2020 - papers.ssrn.com
Recently, there are several studies have proposed user authentication frameworks to defend
against different types of attacks such as phishing, replay attack, man in the middle attack …

[PDF][PDF] Cloud computing authentication attack and mitigation survey

H Abusaimeh, R Al-dwairi - International Journal, 2020 - academia.edu
Securing the information and customer privacy are very important during the attacks are
increased, and the biggest breach happened in the previous year's especially in cloud …

[PDF][PDF] Boosting Cloud Security: The Critical Role of Multi-Factor Authentication

L Martinez - researchgate.net
As cloud computing continues to evolve as a dominant infrastructure model, its security
remains a critical concern, particularly in the face of increasingly sophisticated cyber threats …

[PDF][PDF] Authentication and authorization in service oriented cloud computing architecture

A Beshiri - proceedings.ictinnovations.org
The cloud computing architecture is composed of various types of configurable distributed
systems with a broad range of connectivity, accessibility and usage. Authorization and …

[HTML][HTML] IJNSA 04

H Al-Refai, AM KhaldounBatiha - ijcnc.com
Recently, there are several studies have proposed user authentication frameworks to defend
against different types of attacks such as phishing, replay attack, man in the middle attack …

A Quality Sentient System for Cloud Edge Centric Internet of Things

S Satpathy, B Sahoo, AK Turuk - 2018 15th IEEE India Council …, 2018 - ieeexplore.ieee.org
Cloud Edge centric Internet of Things is a new decentralisation wave encouraged by
consolidating the useful storing and processing capabilities of Cloud Computing and Edge …

EyeHope: (A Real Time Emotion Detection Application)

ZA Memon, H Mubarak, A Khimani, M Malik… - … : Proceedings of the 2018 …, 2019 - Springer
This paper describes about an android application named “EyeHope” whose sole purpose
is to reduce the dependency level of the blind and visually impaired people. This application …