A Study on Improved Authentication Technique in Cloud Computing

Author(s):  
Hwan-Seok Yang
Author(s):  
Omar Ahmed Hedaia ◽  
Ahmed Shawish ◽  
Essam H Houssein ◽  
Hala Zayed

Cloud computing has gained increased interest in the last few years, where an increasing number of providers are converging to such a promising platform. However, the security issues are still a big concern in the cloud, where authentication is a major one. Much research has been conducted to secure the authentication, where some of them used biometric features (fingerprint, face, and voice, etc.). In general, the biometric authentication techniques have a noticeable advantage compared to the traditional techniques because biometric features are hard to be altered or forged. Nevertheless, a new generation of attacks threatens the biometric security by using brute force approaches. This article proposes a nontraditional authentication technique that was called Bio-CAPTCHA. The proposed technique uses a random voice-based password challenge that dynamically changes every time the user tries to login, which promises to significantly decrease the possibility of unauthorized access. The conducted Experimental and theoretical analysis confirms the high-security level of the proposed technique.


2019 ◽  
Vol 49 ◽  
pp. 101522 ◽  
Author(s):  
Subramani Jegadeesan ◽  
Maria Azees ◽  
Priyan Malarvizhi Kumar ◽  
Gunasekaran Manogaran ◽  
Naveen Chilamkurti ◽  
...  

2018 ◽  
Vol 7 (4.12) ◽  
pp. 47
Author(s):  
Gaurav Deep ◽  
Paramroop Kaur ◽  
Rajni Mohana

In recent times, cloud computing has influenced every sector of life, from managing user database online on the cloud to access it on the cloud makes it more flexible to use. Cloud computing has its own security issues like privacy, integrity, confidentiality and authentication. In order to access data on the cloud Authentication majorly plays a very important role. This paper presents a secure multifactor authentication that can be used for Hospital Inventory access in Virtual Private Cloud. Virtual Private cloud is having the benefit of localization as all the data of cloud are accessible within the organization. To secure Hospital Inventory access in Virtual Private Cloud this paper proposes multifactor authentication technique using Biometric, MAC address via payload .The proposed a multifactor authentication protocol which is also validated by using a validation tool Scyther. The outcomes indicate that the proposed multifactor authentication is a robust technique. 


2019 ◽  
Vol 8 (3) ◽  
pp. 8568-8573

The expanded development of cloud computing is emerging as a new paradigm is known as Fog Computing. The focus of the fog is to achieve fine data processing in the cloud. Apart from everything, authentication is the primary security guard to the system. Since fog is a booming paradigm, the traditional authentication techniques lacks in latency issues and fails to satisfy the requirements of fog computing. In this paper, a new Mutual Authentication Technique using ID (MATID) is introduced to entrust complete mutual authentication between fog users and fog nodes. In this technique, fog users and fog nodes have to register themselves in a common Identity Issuer (IDI) to get their authentication message respectively to collaborate in the network. Fog users and fog nodes have to perform only simple hash functions and XOR operations. Our technique mainly focuses on mutual authentication, trustworthiness and reduced computational and communication costs. It ensures higher security and easily adapted to the fog computing environment


2018 ◽  
Vol 23 (11) ◽  
pp. 38-41
Author(s):  
Sebastian Krolop ◽  
Florian Benthin ◽  
Constanze Knahl

Cloud-Computing gewinnt auch in Kliniken zunehmend an Bedeutung. Über das Internet bereitgestellte Lösungen verändern nicht nur Verwaltung und Logistik – im klinischen Bereich geht es zum Beispiel um die Nutzung elektronischer Patientenakten am Point-of-Care.


Author(s):  
Kiran Kumar S V N Madupu

Big Data has terrific influence on scientific discoveries and also value development. This paper presents approaches in data mining and modern technologies in Big Data. Difficulties of data mining as well as data mining with big data are discussed. Some technology development of data mining as well as data mining with big data are additionally presented.


Sign in / Sign up

Export Citation Format

Share Document