Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols

被引:11
|
作者
Siddiqui, Zeeshan [1 ]
Tayan, Omar [2 ,3 ]
Khan, Muhammad Khurram [4 ]
机构
[1] Modern Coll Business & Sci, Muscat 133, Oman
[2] Taibah Univ, Coll Comp Sci & Engn, Dept Comp Engn, Madinah 41411, Saudi Arabia
[3] Taibah Univ, Coll Comp Sci & Engn, NOOR Res Ctr, Madinah 41411, Saudi Arabia
[4] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11653, Saudi Arabia
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Smartphone; remote user authentication; authentication protocols; three-factor authentication; BAN logic; cloud computing; MEDICINE INFORMATION-SYSTEMS; MAP-BASED AUTHENTICATION; BIOMETRIC AUTHENTICATION; SCHEME; EFFICIENT; IMPLEMENTATION; CRYPTANALYSIS; ENHANCEMENT; ENCRYPTION; PROTECTION;
D O I
10.1109/ACCESS.2018.2845299
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We live in a digital world where every detail of our information is being transferred from one smart device to another via cross-platform, third-party cloud services. Smart technologies, such as, smartphones are playing dynamic roles in order to successfully complete our daily routines and official tasks that require access to all types of critical data. Before the advent of these smart technologies, securing critical information was quite a challenge. However, after the advent and global adoption of such technologies, information security has become one of the primary and most fundamental task for security professionals. The integration of social media has made this task even more challenging to undertake successfully. To this day, there are plentiful studies in which numerous authentication and security techniques were proposed and developed for smartphone and cloud computing technologies. These studies have successfully addressed multiple authentication threats and other related issues in existing the smartphone and cloud computing technologies. However, to the best of our understanding and knowledge, these studies lack many aspects in terms of authentication attacks, logical authentication analysis, and the absence of authentication implementation scenarios. Due to these authentication anomalies and ambiguities, such studies cannot be fully considered for successful implementation. Therefore, in this paper, we have performed a comprehensive security analysis and review of various smartphone and cloud computing authentication frameworks and protocols to outline up-to-date authentication threats and issues in the literature. These authentication challenges are further summarized and presented in the form of different graphs to illustrate where the research is currently heading. Finally, based on those outcomes, we identify the latest and existing authentication uncertainties, threats, and other related issues to address future directions and open research issues in the domain of the smartphone- and cloud-computing authentication.
引用
收藏
页码:34527 / 34542
页数:16
相关论文
共 50 条
  • [1] A Brief Review on Cloud Computing Authentication Frameworks
    Khan, Abdul Raouf
    Alnwihel, Latifa Khalid
    [J]. ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2023, 13 (01) : 9997 - 10004
  • [2] Comparative Analysis of Cloud Computing Security Frameworks for Financial Sector
    Mohanan, Sudhish
    Sridhar, Nandagopal
    Bhatia, Sajal
    [J]. PROCEEDINGS OF SIXTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICICT 2021), VOL 2, 2022, 236 : 1015 - 1025
  • [3] SECURITY FRAMEWORKS FOR MOBILE CLOUD COMPUTING: A SURVEY
    Kulkarni, Pallavi
    Khanai, Rajashri
    Bindagi, Gururaj
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 2507 - 2511
  • [4] An Analysis of Open Standard Identity Protocols in Cloud Computing Security Paradigm
    Naik, Nitin
    Jenkins, Paul
    [J]. 2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 428 - 431
  • [5] Web security: Authentication protocols and their analysis
    Wen, W
    Mizoguchi, F
    [J]. NEW GENERATION COMPUTING, 2001, 19 (03) : 283 - 299
  • [6] Web security: Authentication protocols and their analysis
    Wu Wen
    Fumio Mizoguchi
    [J]. New Generation Computing, 2001, 19 : 283 - 299
  • [7] Data Security and Authentication in Hybrid Cloud Computing Model
    Wang, Jingxin K.
    Jia, Xinpei
    [J]. 2012 IEEE GLOBAL HIGH TECH CONGRESS ON ELECTRONICS (GHTCE), 2012,
  • [8] Review of Data Security Frameworks for Secure Cloud Computing
    Umrigar, Kunaal
    Mathew, Rejo
    [J]. PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 933 - 941
  • [9] VANET authentication protocols: security analysis and a proposal
    Piramuthu, Otto B.
    Caesar, Matthew
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (02): : 2153 - 2179
  • [10] Analysis on the Security of Cloud Computing
    He Zhonglin
    He Yuhua
    [J]. PIAGENG 2010: PHOTONICS AND IMAGING FOR AGRICULTURAL ENGINEERING, 2010, 7752