A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure

被引:8
|
作者
Otta, Soumya Prakash [1 ]
Panda, Subhrakanta [1 ]
Gupta, Maanak [2 ]
Hota, Chittaranjan [1 ]
机构
[1] Birla Inst Technol & Sci Pilani, Dept Comp Sci & Informat Syst, Hyderabad Campus, Secunderabad 500078, India
[2] Tennessee Technol Univ, Coll Engn, Dept Comp Sci, Cookeville, TN 38505 USA
来源
FUTURE INTERNET | 2023年 / 15卷 / 04期
关键词
access control; authentication management; authorization management; biometrics; cloud computing; cloud IAM; multi-factor authentication; user identity; ACCESS-CONTROL; PASSWORD; ABAC;
D O I
10.3390/fi15040146
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest numerous approaches to enhance cloud authentication towards robustness. User names and associated passwords have been a common practice for long as Single Factor Authentication. However, advancements in the speed of computing and the usage of simple methods, starting from the Brute Force technique to the implementation of advanced and efficient crytographic algorithms, have posed several threats and vulnerabilities for authentication systems, leading to the degradation of their effectiveness. Multi-factor authentication has emerged as a robust means of securing the cloud using simultaneous and multiple means of authentication factors. This employs multiple levels of cascaded authentication checks. This paper covers an extensive and systematic survey of various factors towards their adoption and suitability for authentication for multi-factor authentication mechanisms. The inference drawn from the survey is in terms of arriving at a unique authentication factor that does not require any additional, specialized hardware or software for multi-factor authentication. Such authentication also uses the distinct biometric characteristics of the concerned user in the process. This arrangement augments the secured and robust user authentication process. The mechanism is also assessed as an effective means against impersonation attacks.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] Multi-Factor Authentication to Systems Login
    ALSaleem, Bandar Omar
    Alshoshan, Abdullah, I
    2021 IEEE NATIONAL COMPUTING COLLEGES CONFERENCE (NCCC 2021), 2021, : 1092 - 1095
  • [32] A Multi-Factor Authentication-Based Framework for Identity Management in Cloud Applications
    Said, Wael
    Mostafa, Elsayed
    Hassan, M. M.
    Mostafa, Ayman Mohamed
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (02): : 3193 - 3209
  • [33] Securing HPC: Development of a Low Cost, Open Source Multi-factor Authentication Infrastructure
    Proctor, W. Cyrus
    Storm, Patrick
    Hanlon, Matthew R.
    Mendoza, Nathaniel
    SC'17: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE FOR HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS, 2017,
  • [34] Multi-factor Authentication: A Survey and Challenges in V2X Applications
    Ometov, Aleksandr
    Bezzateev, Sergey
    2017 9TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2017, : 129 - 136
  • [35] A Secure Multi-factor Remote User Authentication Scheme for Cloud-IoT Applications
    Lee, JoonYoung
    Kim, MyeongHyun
    Yu, SungJin
    Park, KiSung
    Park, YoungHo
    2019 28TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2019,
  • [36] Multi-factor Authentication based on Multimodal Biometrics (MFA-MB) for Cloud Computing
    Mansour, Abdeljebar
    Sadik, Mohamed
    Sabir, Essaid
    2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2015,
  • [37] Database Multi-factor Authentication via Pluggable Authentication Modules
    Hamilton, Cameron
    Olmstead, Aspen
    2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 367 - 368
  • [38] Multi-factor authentication using threshold cryptography
    1694, Institute of Electrical and Electronics Engineers Inc., United States
  • [39] Internet Banking Login with Multi-Factor Authentication
    Boonkrong, Sirapat
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (01): : 511 - 535
  • [40] Multi-Factor Authentication in Key Management Systems
    de Souza, Rick Lopes
    Lung, Lau Cheuk
    Custodio, Ricardo Felipe
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 746 - 752