Privacy preserving multi factor authentication using trust management

被引:0
|
作者
A. S. Anakath
S. Rajakumar
S. Ambika
机构
[1] University College of Engineering,
来源
Cluster Computing | 2019年 / 22卷
关键词
Cloud computing; Authentication in cloud; Multi factor authentication (MFA); Cloud security; Trust model;
D O I
暂无
中图分类号
学科分类号
摘要
A proper access control mechanism is the need of the hour, as the data stored in the cloud needs to be protected securely. Generally, a multifactor authentication (MFA) is preferred, one that needs the authentication of two or even more aspects based on identity, information and facts, and ownership which needs to check the value and correctness of users while logging into cloud services. Clouds such as Amazon, Google, Microsoft etc. generally have an additional attribute, one that is automatically made inactive. The MFA are intrusive and untrusted cloud servers can access user’s sensitive information. The objective of this work is to use a trust model which can identify client device. For instance, if the client device is public then a biometric authentication is provided. Based on the client device, trust is computed and the authentication process will be reduced from multifactor to single factor. Experimental results show that improved performance is attained by the proposed trust based MFA.
引用
收藏
页码:10817 / 10823
页数:6
相关论文
共 50 条
  • [1] Privacy preserving multi factor authentication using trust management
    Anakath, A. S.
    Rajakumar, S.
    Ambika, S.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 10817 - 10823
  • [2] Privacy preserving multi-factor authentication with biometrics
    Bhargav-Spantzel, Abhilasha
    Squicciarini, Anna
    Modi, Shimon
    Young, Matthew
    Bertino, Elisa
    Elliott, Stephen
    [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (05) : 529 - 560
  • [3] Privacy-preserving blockchain-based authentication and trust management in VANETs
    Ahmed, Waheeb
    Di, Wu
    Mukathe, Daniel
    [J]. IET NETWORKS, 2022, 11 (3-4) : 89 - 111
  • [4] A trust based adaptive privacy preserving authentication scheme for VANETs
    Zhang, Song
    Liu, Yanbing
    Xiao, Yunpeng
    He, Rui
    [J]. VEHICULAR COMMUNICATIONS, 2022, 37
  • [5] A Trust and Privacy Preserving Handover Authentication Protocol for Wireless Networks
    Yang, Xu
    Zhang, Yuexin
    Liu, Joseph K.
    Zeng, Yali
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 138 - 143
  • [6] Trust Management In Privacy - Preserving Information System
    Peng, Kun
    Bao, Feng
    [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 7, 2010, : 1 - 4
  • [7] Privacy-preserving authentication scheme based on zero trust architecture
    Fei Tang
    Chunliang Ma
    Kefei Cheng
    [J]. Digital Communications and Networks, 2024, 10 (05) : 1211 - 1220
  • [8] Privacy-preserving authentication scheme based on zero trust architecture
    Tang, Fei
    Ma, Chunliang
    Cheng, Kefei
    [J]. Digital Communications and Networks, 2024, 10 (05) : 1211 - 1220
  • [9] PRIVACY-PRESERVING AUTHENTICATION USING FINGERPRINT
    Feng, Quan
    Su, Fei
    Cai, Anni
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (11): : 8001 - 8018
  • [10] Privacy-preserving authentication using fingerprint
    [J]. Feng, Q. (fquan@sina.com), 1600, ICIC International (08):