Two Factor Vs Multi-factor, an Authentication Battle in Mobile Cloud Computing Environments

被引:12
|
作者
Mohsin, J. K. [1 ]
Han, Liangxiu [1 ]
Hammoudeh, Mohammad [1 ]
Hegarty, Rob [1 ]
机构
[1] Manchester Metropolitan Univ, Sch Comp Math & Digital Technol, Manchester, Lancs, England
关键词
Authentication; Mobile Cloud Computing; SSO; Two Factor; Multi-factor; Security; Wireless; Networks; Man-in-the-middle Attack; Sniffing; Biometrics; SERVICE;
D O I
10.1145/3102304.3102343
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile devices offer a convenient way of accessing our digital lives and many of those devices hold sensitive data that needs protecting. Mobile and wireless communications networks, combined with cloud computing as Mobile Cloud Computing (MCC), have emerged as a new way to provide a rich computational environment for mobile users, and business opportunities for cloud providers and network operators. It is the convenience of the cloud service and the ability to sync across multiple platforms/devices that has become the attraction to cloud computing. However, privacy, security and trust issues may still be a barrier that impedes the adoption of MCC by some undecided potential users. Those users still need to be convinced of the security of mobile devices, wireless networks and cloud computing. This paper is the result of a comprehensive review of one typical secure measure-authentication methodology research, spanning a period of five years from 2012 - 2017. MCC capabilities for sharing distributed resources is discussed. Authentication in MCC is divided in to two categories and the advantages of one category over its counterpart are presented, in the process of attempting to identify the most secure authentication scheme.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Feasibility of Implementing Multi-factor Authentication Schemes in Mobile Cloud Computing
    Alizadeh, Mojtaba
    Hassan, Wan Haslina
    Khodadadi, Touraj
    [J]. PROCEEDINGS FIFTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS, MODELLING AND SIMULATION, 2014, : 615 - 618
  • [2] Multi-Factor Authentication on Cloud
    Khan, Salman H.
    Akbar, M. Ali
    [J]. 2015 INTERNATIONAL CONFERENCE ON DIGITAL IMAGE COMPUTING: TECHNIQUES AND APPLICATIONS (DICTA), 2015, : 548 - 554
  • [3] Mobile Multi-Factor Authentication
    Bissada, Andrew
    Olmsted, Aspen
    [J]. 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 210 - 211
  • [4] Enhanced Multi-factor Authentication on the Cloud
    Alyounis, Essa
    Dinah, Quanq
    [J]. INNOVATION MANAGEMENT AND SUSTAINABLE ECONOMIC COMPETITIVE ADVANTAGE: FROM REGIONAL DEVELOPMENT TO GLOBAL GROWTH, VOLS I - VI, 2015, 2015, : 69 - 77
  • [5] Multi-factor Authentication Framework for Secured Data Access in Cloud Computing
    Rajakumar, Ponnumani
    Partheeban, Nagappan
    [J]. RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2024,
  • [6] Multi-Factor Authentication with OpenId in Virtualized Environments
    Alves, J. M.
    Rodrigues, T. G.
    Beserra, D. W.
    Fonseca, J. C.
    Endo, P. T.
    Kelner, J.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2017, 15 (03) : 528 - 533
  • [7] Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing
    Derhab, Abdelouahid
    Belaoued, Mohamed
    Guerroumi, Mohamed
    Khan, Farrukh Aslam
    [J]. IEEE ACCESS, 2020, 8 : 28956 - 28969
  • [8] CLOUD STORAGE SECURITY USING MULTI-FACTOR AUTHENTICATION
    Nikam, Rushikesh
    Potey, Manish
    [J]. 2016 INTERNATIONAL CONFERENCE ON RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2016,
  • [9] A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure
    Otta, Soumya Prakash
    Panda, Subhrakanta
    Gupta, Maanak
    Hota, Chittaranjan
    [J]. FUTURE INTERNET, 2023, 15 (04):
  • [10] Multi-factor Authentication based on Multimodal Biometrics (MFA-MB) for Cloud Computing
    Mansour, Abdeljebar
    Sadik, Mohamed
    Sabir, Essaid
    [J]. 2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2015,