Universiti Teknologi Malaysia Institutional Repository

Authentication methods in cloud computing: a survey

Padma, P. and Srinivasan, Sumana V. (2015) Authentication methods in cloud computing: a survey. Research Journal Of Applied Sciences, Engineering And Technology, 9 (8). pp. 655-664. ISSN 2040-7459

Full text not available from this repository.

Official URL: http://dx.doi.org/10.1109/INVENTIVE.2016.7823273

Abstract

The study focuses on presenting a review on the various biometric authentication mechanisms in the cloud computing environment. Cloud Computing is used to deliver computing Services over the internet and is used to store data in cloud servers. Due to the sharing of services, privacy and data security have become a major area of concern in cloud computing. The cloud service providers store and maintain client data across data centers which provides threats of data leaks. It is found that several mechanisms have emphasized on data security and in the ensuing process have ignored privacy. Authentication helps to ensure and confirms a user's identity. The existing traditional password authentication does not provide enough security for the data residing in cloud and there have been instances when the password based authentication has been manipulated to gain access into the cloud data. Multifactor authentication is a methodology that uses two or more authentication techniques along with the password but it still does not provide fool-proof data security. Since the conventional methods such as passwords do not serve the purpose of data security, research works focused on biometric traits were as a means of user authentication in cloud services. The biometric authentication is broadly classified into physical based biometric authentication and behavioral based biometric authentication. This paper presents an overview of those methods and analyzes their merits and demerits. The study has been structured to analyze the prevailing biometric authentication mechanisms to gain insights in developing a new authentication model that is more efficient than the existing methods.

Item Type:Article
Uncontrolled Keywords:authentication, identity, multifactor, privacy, security
Subjects:Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions:Computing
ID Code:57925
Deposited By: Haliza Zainal
Deposited On:04 Dec 2016 04:07
Last Modified:09 Dec 2021 03:39

Repository Staff Only: item control page