Attacks and defenses in user authentication systems: A survey

X Wang, Z Yan, R Zhang, P Zhang - Journal of Network and Computer …, 2021 - Elsevier
User authentication systems (in short authentication systems) have wide utilization in our
daily life. Unfortunately, existing authentication systems are prone to various attacks while …

Secure biometric authentication with de-duplication on distributed cloud storage

K Venkatachalam, P Prabu, A Almutairi… - PeerJ Computer …, 2021 - peerj.com
Cloud computing is one of the evolving fields of technology, which allows storage, access of
data, programs, and their execution over the internet with offering a variety of information …

A survey on biometric based authentication in cloud computing

P Padma, S Srinivasan - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
The study focuses on presenting a review on the various biometric authentication
mechanisms in the cloud computing environment. Cloud Computing is used to deliver …

[PDF][PDF] A survey on biometric authentication systems in cloud to combat identity theft

V Carmel, D Akila - Journal of Critical Reviews, 2020 - researchgate.net
Biometrics has by far proven to be an effective solution for many of the security challenges
that is prevalent in most of the technical fields in this Digital era. It is the measurement of …

Security analysis of smartphone and cloud computing authentication frameworks and protocols

Z Siddiqui, O Tayan, MK Khan - IEEE Access, 2018 - ieeexplore.ieee.org
We live in a digital world where every detail of our information is being transferred from one
smart device to another via cross-platform, third-party cloud services. Smart technologies …

A Review on cloud computing security using authentication techniques.

H Farooq - International Journal of Advanced Research in …, 2017 - search.ebscohost.com
During the last two decades, the use of internet has been changing every domain of
technology. It has also led to the tremendous development and implementation of cloud …

A more secure scheme for CAPTCHA-based authentication in cloud environment

IA Althamary, ESM El-Alfy - 2017 8th International Conference …, 2017 - ieeexplore.ieee.org
Cloud computing is a remarkable model for permitting on-demand network access to an
elastic collection of configurable adaptive resources and features including storage …

A robust mutual authentication scheme for data security in cloud architecture

M Sarvabhatla, CS Vorugunti - 2015 7th international …, 2015 - ieeexplore.ieee.org
Emerging markets looks cloud computing as a facilitator to lower their investments related to
ICT. Unlimited throughput, on demand and elastic nature of cloud attracted the medium and …

[PDF][PDF] User authentication in public cloud computing through adoption of electronic personal synthesis behavior

MT SHAKIR - 2020 - researchgate.net
Public cloud computing is one of the deployment services that can be accessed by all
potential users through a website or program interface, at any time, from anywhere, and by …

[PDF][PDF] Cloud Based Attendance System

M Mehta, S Verma - 2024 - ir.juit.ac.in
Robust and secure authentication techniques are becoming increasingly important as the
digital landscape changes. The primary objective of this project is to design and build a safe …