A Brief Review on Cloud Computing Authentication Frameworks
Received: 10 November 2022 | Revised: 23 November 2022 | Accepted: 26 November 2022 | Online: 18 December 2022
Corresponding author: Abdul Raouf Khan
Abstract
Cloud computing is among the most widely used technologies worldwide as it helps individual users and organizations to store and share information conveniently and cost-effectively. However, data security is a major concern in cloud computing. Security involves guaranteed access to the data only to authorized users and protection against various threats and attacks. Security is generally achieved through the appropriate and efficient implementation of access control, authentication, and authorization mechanisms. Various frameworks have been proposed and implemented for authentication and access control in cloud computing. This paper discusses some of the main authentication frameworks in cloud computing, highlighting their methodologies, algorithms, and problems and identifying the issues that should form the focus of research in the area.
Keywords:
cloud security, cloud computing, security framework, cloud authenticationDownloads
References
M. Alsaif, N. Aljaafari, and A. R. Khan, "Information Security Management in Saudi Arabian Organizations," Procedia Computer Science, vol. 56, pp. 213–216, Jan. 2015. DOI: https://doi.org/10.1016/j.procs.2015.07.201
B. Heydari and M. Aajami, "Providing a New Model for Discovering Cloud Services Based on Ontology," Engineering, Technology & Applied Science Research, vol. 7, no. 6, pp. 2268–2272, Dec. 2017. DOI: https://doi.org/10.48084/etasr.1577
M. Ramzan, M. S. Farooq, A. Zamir, W. Akhtar, M. Ilyas, and H. U. Khan, "An Analysis of Issues for Adoption of Cloud Computing in Telecom Industries," Engineering, Technology & Applied Science Research, vol. 8, no. 4, pp. 3157–3161, Aug. 2018. DOI: https://doi.org/10.48084/etasr.2101
M. F. Hyder, S. Tooba, and Waseemullah, "Performance Evaluation of RSA-based Secure Cloud Storage Protocol using OpenStack," Engineering, Technology & Applied Science Research, vol. 11, no. 4, pp. 7321–7325, Aug. 2021. DOI: https://doi.org/10.48084/etasr.4220
G. J. W. Kathrine, "A secure framework for enhancing user authentication in cloud environment using biometrics," in 2017 International Conference on Signal Processing and Communication (ICSPC), Coimbatore, India, Jul. 2017, pp. 283–287. DOI: https://doi.org/10.1109/CSPC.2017.8305854
S. K. Khatri, Monica, and V. R. Vadi, "Biometrie based authentication and access control techniques to secure mobile cloud computing," in 2017 2nd International Conference on Telecommunication and Networks (TEL-NET), Dec. 2017, pp. 1–7. DOI: https://doi.org/10.1109/TEL-NET.2017.8343558
D. Chattaraj and M. Sarma, "Dependability Quantification of Cloud-Centric Authentication Frameworks," in 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), San Francisco, CA, USA, Jul. 2018, pp. 840–844. DOI: https://doi.org/10.1109/CLOUD.2018.00117
H. A. Dinesha and V. K. Agrawal, "Multi-level authentication technique for accessing cloud services," in 2012 International Conference on Computing, Communication and Applications, Dindigul, India, Oct. 2012, pp. 1–4. DOI: https://doi.org/10.1109/ICCCA.2012.6179130
V. K. Pant, J. Prakash, and A. Asthana, "Three step data security model for cloud computing based on RSA and steganography," in 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), Greater Noida, India, Jul. 2015, pp. 490–494. DOI: https://doi.org/10.1109/ICGCIoT.2015.7380514
M. Jensen, S. Schäge, and J. Schwenk, "Towards an Anonymous Access Control and Accountability Scheme for Cloud Computing," in 2010 IEEE 3rd International Conference on Cloud Computing, Miami, FL, USA, Jul. 2010, pp. 540–541. DOI: https://doi.org/10.1109/CLOUD.2010.61
L. Wang and T. Song, "An Improved Digital Signature Algorithm and Authentication Protocols in Cloud Platform," in 2016 IEEE International Conference on Smart Cloud (SmartCloud), New York, NY, USA, Aug. 2016, pp. 319–324. DOI: https://doi.org/10.1109/SmartCloud.2016.46
K. S. Gajghate and R. V. Mante, "Secure Document Sharing and Access Control on Cloud for Corporate User," in 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore, India, Apr. 2018, pp. 135–138. DOI: https://doi.org/10.1109/ICICCT.2018.8473095
P. Sirohi and A. Agarwal, "Cloud computing data storage security framework relating to data integrity, privacy and trust," in 2015 1st International Conference on Next Generation Computing Technologies (NGCT), Dehradun, India, Sep. 2015, pp. 115–118. DOI: https://doi.org/10.1109/NGCT.2015.7375094
R. Fathi, M. A. Salehi, and E. L. Leiss, "User-Friendly and Secure Architecture (UFSA) for Authentication of Cloud Services," in 2015 IEEE 8th International Conference on Cloud Computing, New York, NY, USA, Jun. 2015, pp. 516–523. DOI: https://doi.org/10.1109/CLOUD.2015.75
L. K. ALnwihel and A. R. Khan, "A Novel Cloud Authentication Framework," in 2020 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, Sep. 2020, pp. 1302–1308. DOI: https://doi.org/10.1109/CSCI51800.2020.00243
J. Shen, D. Liu, S. Chang, J. Shen, and D. He, "A Lightweight Mutual Authentication Scheme for User and Server in Cloud," in 2015 First International Conference on Computational Intelligence Theory, Systems and Applications (CCITSA), Ilan, Taiwan, Sep. 2015, pp. 183–186. DOI: https://doi.org/10.1109/CCITSA.2015.47
S. Dey, S. Sampalli, and Q. Ye, "A light-weight authentication scheme based on message digest and location for mobile cloud computing," in 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC), Austin, TX, USA, Sep. 2014, pp. 1–2. DOI: https://doi.org/10.1109/PCCC.2014.7017041
S. H. Na, J. Y. Park, and E. N. Huh, "Personal Cloud Computing Security Framework," in 2010 IEEE Asia-Pacific Services Computing Conference, Hangzhou, China, Sep. 2010, pp. 671–675.
V. Nandina, J. M. Luna, C. C. Lamb, G. L. Heileman, and C. T. Abdallah, "Provisioning Security and Performance Optimization for Dynamic Cloud Environments," in 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, Jun. 2014, pp. 979–981. DOI: https://doi.org/10.1109/CLOUD.2014.150
. S. K. M., "Enhanced Security Framework to Ensure Data Security in Cloud Using Security Blanket Algorithm," International Journal of Research in Engineering and Technology, vol. 02, no. 10, pp. 225–229, Oct. 2013. DOI: https://doi.org/10.15623/ijret.2013.0210033
A. Bhandari, A. Gupta, and D. Das, "A framework for data security and storage in Cloud Computing," in 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), New Delhi, India, Mar. 2016, pp. 1–7. DOI: https://doi.org/10.1109/ICCTICT.2016.7514542
S. C. Patel, R. S. Singh, and S. Jaiswal, "Secure and privacy enhanced authentication framework for cloud computing," in 2015 2nd International Conference on Electronics and Communication Systems (ICECS), Coimbatore, India, Oct. 2015, pp. 1631–1634. DOI: https://doi.org/10.1109/ECS.2015.7124863
V. S. Mahalle and A. K. Shahade, "Enhancing the data security in Cloud by implementing hybrid (Rsa & Aes) encryption algorithm," in 2014 International Conference on Power, Automation and Communication (INPAC), Amravati, India, Jul. 2014, pp. 146–149. DOI: https://doi.org/10.1109/INPAC.2014.6981152
P. Yellamma, C. Narasimham, and V. Sreenivas, "Data security in cloud using RSA," in 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Tiruchengode, India, Jul. 2013, pp. 1–6. DOI: https://doi.org/10.1109/ICCCNT.2013.6726471
S. Verma and S. Ahuja, "A hybrid two layer attribute based encryption for privacy preserving in public cloud," in 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, Dec. 2016, vol. 2, pp. 1–5. DOI: https://doi.org/10.1109/INVENTIVE.2016.7824822
P. Rewagad and Y. Pawar, "Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing," in 2013 International Conference on Communication Systems and Network Technologies, Gwalior, India, Apr. 2013, pp. 437–439. DOI: https://doi.org/10.1109/CSNT.2013.97
P. Garg and V. Sharma, "An efficient and secure data storage in Mobile Cloud Computing through RSA and Hash function," in 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), Ghaziabad, India, Oct. 2014, pp. 334–339. DOI: https://doi.org/10.1109/ICICICT.2014.6781303
S. K. Sood, "A combined approach to ensure data security in cloud computing," Journal of Network and Computer Applications, vol. 35, no. 6, pp. 1831–1838, Nov. 2012. DOI: https://doi.org/10.1016/j.jnca.2012.07.007
S. Dey, S. Sampalli, and Q. Ye, "MDA: message digest-based authentication for mobile cloud computing," Journal of Cloud Computing, vol. 5, no. 1, Nov. 2016, Art. no. 18. DOI: https://doi.org/10.1186/s13677-016-0068-6
Downloads
How to Cite
License
Copyright (c) 2022 Abdul Raouf Khan, Latifa Khalid Alnwihel
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.