A Multi-factor Authentication Scheme to Strength Data-Storage Access

被引:1
|
作者
Sail, Soufiane [1 ]
Bouden, Halima [1 ]
机构
[1] Univ AbdelMalek Essaadi, Lab Modelisat & Theorie Informat, Tetouan, Morocco
关键词
Security; Cloud computing; Software as a service; OTP; Smart card; Captcha; Data storage;
D O I
10.1007/978-3-319-96292-4_6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays Cloud Computing is one of the most useful IT technology in the world, many companies and individuals, adopt this technology due to its benefits, such as high performance infrastructure, scalability, cost efficiency etc. However Security remains one of the biggest problems that make this technology less trustful. With the big success of the Cloud, many Hackers started focusing on it, and many attacks that use to be exclusively targeting the web, are now used against Cloud system especially the SaaS. That's why authentication to the SaaS and data storage systems is now a serious issue, in order to protect our system and client information. This paper describes a scheme that strength the authentication system of data storage, using multi-factor authentication such as OTP, smart card and try to bring an alternative system that manage authentication Error issues.
引用
收藏
页码:67 / 77
页数:11
相关论文
共 50 条
  • [31] Multi-factor User Authentication Scheme for Multi-gateway Wireless Sensor Networks
    Wang C.-Y.
    Wang D.
    Wang F.-F.
    Xu G.-A.
    Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (04): : 683 - 700
  • [32] Multi-factor authentication at jagged peak
    Gill G.
    Jones J.
    2016, Informing Science Institute (05) : 1 - 16
  • [33] Dynamic Multi-factor Authentication for Smartphone
    Yohan, Alexander
    Lo, Nai-Wei
    Lie, Henry Roes
    2016 IEEE 27TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2016, : 2448 - 2453
  • [34] Ubiquitous Desktops with Multi-factor Authentication
    Doyle, Paul
    Deegan, Mark
    O'Driscoll, Ciaran
    Gleeson, Michael
    Gillespie, Brian
    2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 201 - 206
  • [35] Enhanced Multi-factor Authentication on the Cloud
    Alyounis, Essa
    Dinah, Quanq
    INNOVATION MANAGEMENT AND SUSTAINABLE ECONOMIC COMPETITIVE ADVANTAGE: FROM REGIONAL DEVELOPMENT TO GLOBAL GROWTH, VOLS I - VI, 2015, 2015, : 69 - 77
  • [36] Practical Threshold Multi-Factor Authentication
    Li, Wenting
    Cheng, Haibo
    Wang, Ping
    Liang, Kaitai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3573 - 3588
  • [37] Commentary: Multi-factor identification and authentication
    Morrison, Rodger
    INFORMATION SYSTEMS MANAGEMENT, 2007, 24 (04) : 331 - 332
  • [38] Multi-Factor Authentication to Systems Login
    ALSaleem, Bandar Omar
    Alshoshan, Abdullah, I
    2021 IEEE NATIONAL COMPUTING COLLEGES CONFERENCE (NCCC 2021), 2021, : 1092 - 1095
  • [39] ECC-Based Anonymous and Multi-factor Authentication Scheme for IoT Environment
    Dargaoui, Souhayla
    Azrour, Mourade
    El Allaoui, Ahmad
    Guezzaz, Azidine
    Alabdulatif, Abdulatif
    Ahmad, Sultan
    INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2025, 21 (01) : 56 - 75
  • [40] Secure multi-factor remote user authentication scheme for Internet of Things environments
    Dhillon, Parwinder Kaur
    Kalra, Sheetal
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (16)