A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure

被引:8
|
作者
Otta, Soumya Prakash [1 ]
Panda, Subhrakanta [1 ]
Gupta, Maanak [2 ]
Hota, Chittaranjan [1 ]
机构
[1] Birla Inst Technol & Sci Pilani, Dept Comp Sci & Informat Syst, Hyderabad Campus, Secunderabad 500078, India
[2] Tennessee Technol Univ, Coll Engn, Dept Comp Sci, Cookeville, TN 38505 USA
来源
FUTURE INTERNET | 2023年 / 15卷 / 04期
关键词
access control; authentication management; authorization management; biometrics; cloud computing; cloud IAM; multi-factor authentication; user identity; ACCESS-CONTROL; PASSWORD; ABAC;
D O I
10.3390/fi15040146
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest numerous approaches to enhance cloud authentication towards robustness. User names and associated passwords have been a common practice for long as Single Factor Authentication. However, advancements in the speed of computing and the usage of simple methods, starting from the Brute Force technique to the implementation of advanced and efficient crytographic algorithms, have posed several threats and vulnerabilities for authentication systems, leading to the degradation of their effectiveness. Multi-factor authentication has emerged as a robust means of securing the cloud using simultaneous and multiple means of authentication factors. This employs multiple levels of cascaded authentication checks. This paper covers an extensive and systematic survey of various factors towards their adoption and suitability for authentication for multi-factor authentication mechanisms. The inference drawn from the survey is in terms of arriving at a unique authentication factor that does not require any additional, specialized hardware or software for multi-factor authentication. Such authentication also uses the distinct biometric characteristics of the concerned user in the process. This arrangement augments the secured and robust user authentication process. The mechanism is also assessed as an effective means against impersonation attacks.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] Multi-factor authentication for shibboleth identity providers
    de Mello, Emerson Ribeiro
    Wangham, Michelle Silva
    Loli, Samuel Bristot
    da Silva, Carlos Eduardo
    da Silva, Gabriela Cavalcanti
    de Chaves, Shirlei Aparecida
    Loli, Bruno Bristot
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2020, 11 (01)
  • [42] A Method of Risk Assessment for Multi-Factor Authentication
    Kim, Jae-Jung
    Hong, Seng-Phil
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2011, 7 (01): : 187 - 198
  • [43] Multi-Factor Authentication Using Threshold Cryptography
    Venukumar, Vishnu
    Pathari, Vinod
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 1694 - 1698
  • [44] Privacy preserving multi-factor authentication with biometrics
    Bhargav-Spantzel, Abhilasha
    Squicciarini, Anna
    Modi, Shimon
    Young, Matthew
    Bertino, Elisa
    Elliott, Stephen
    JOURNAL OF COMPUTER SECURITY, 2007, 15 (05) : 529 - 560
  • [45] Multi-Factor Authentication with OpenId in Virtualized Environments
    Alves, J. M.
    Rodrigues, T. G.
    Beserra, D. W.
    Fonseca, J. C.
    Endo, P. T.
    Kelner, J.
    IEEE LATIN AMERICA TRANSACTIONS, 2017, 15 (03) : 528 - 533
  • [46] Robust Multi-Factor Authentication for Fragile Communications
    Huang, Xinyi
    Xiang, Yang
    Bertino, Elisa
    Zhou, Jianying
    Xu, Li
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (06) : 568 - 581
  • [47] A Blockchain-Based Multi-Factor Authentication Model for a Cloud-Enabled Internet of Vehicles
    Kebande, Victor R.
    Awaysheh, Feras M.
    Ikuesan, Richard A.
    Alawadi, Sadi A.
    Alshehri, Mohammad Dahman
    SENSORS, 2021, 21 (18)
  • [48] Advanced lightweight multi-factor remote user authentication scheme for cloud-IoT applications
    Geeta Sharma
    Sheetal Kalra
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 1771 - 1794
  • [49] Explaining the Workings Principle of Cloud-based Multi-factor Authentication Architecture on Banking Sectors
    Bose, Rajesh
    Chakraborty, Srabanti
    Roy, Sandip
    PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 764 - 768
  • [50] MACA: A Privacy-Preserving Multi-factor Cloud Authentication System Utilizing Big Data
    Liu, Wenyi
    Uluagac, A. Selcuk
    Beyah, Raheem
    2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 518 - 523