A Brief Review on Cloud Computing Authentication Frameworks

Authors

Volume: 13 | Issue: 1 | Pages: 9997-10004 | February 2023 | https://doi.org/10.48084/etasr.5479

Abstract

Cloud computing is among the most widely used technologies worldwide as it helps individual users and organizations to store and share information conveniently and cost-effectively. However, data security is a major concern in cloud computing. Security involves guaranteed access to the data only to authorized users and protection against various threats and attacks. Security is generally achieved through the appropriate and efficient implementation of access control, authentication, and authorization mechanisms. Various frameworks have been proposed and implemented for authentication and access control in cloud computing. This paper discusses some of the main authentication frameworks in cloud computing, highlighting their methodologies, algorithms, and problems and identifying the issues that should form the focus of research in the area.

Keywords:

cloud security, cloud computing, security framework, cloud authentication

Downloads

Download data is not yet available.

References

M. Alsaif, N. Aljaafari, and A. R. Khan, "Information Security Management in Saudi Arabian Organizations," Procedia Computer Science, vol. 56, pp. 213–216, Jan. 2015. DOI: https://doi.org/10.1016/j.procs.2015.07.201

B. Heydari and M. Aajami, "Providing a New Model for Discovering Cloud Services Based on Ontology," Engineering, Technology & Applied Science Research, vol. 7, no. 6, pp. 2268–2272, Dec. 2017. DOI: https://doi.org/10.48084/etasr.1577

M. Ramzan, M. S. Farooq, A. Zamir, W. Akhtar, M. Ilyas, and H. U. Khan, "An Analysis of Issues for Adoption of Cloud Computing in Telecom Industries," Engineering, Technology & Applied Science Research, vol. 8, no. 4, pp. 3157–3161, Aug. 2018. DOI: https://doi.org/10.48084/etasr.2101

M. F. Hyder, S. Tooba, and Waseemullah, "Performance Evaluation of RSA-based Secure Cloud Storage Protocol using OpenStack," Engineering, Technology & Applied Science Research, vol. 11, no. 4, pp. 7321–7325, Aug. 2021. DOI: https://doi.org/10.48084/etasr.4220

G. J. W. Kathrine, "A secure framework for enhancing user authentication in cloud environment using biometrics," in 2017 International Conference on Signal Processing and Communication (ICSPC), Coimbatore, India, Jul. 2017, pp. 283–287. DOI: https://doi.org/10.1109/CSPC.2017.8305854

S. K. Khatri, Monica, and V. R. Vadi, "Biometrie based authentication and access control techniques to secure mobile cloud computing," in 2017 2nd International Conference on Telecommunication and Networks (TEL-NET), Dec. 2017, pp. 1–7. DOI: https://doi.org/10.1109/TEL-NET.2017.8343558

D. Chattaraj and M. Sarma, "Dependability Quantification of Cloud-Centric Authentication Frameworks," in 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), San Francisco, CA, USA, Jul. 2018, pp. 840–844. DOI: https://doi.org/10.1109/CLOUD.2018.00117

H. A. Dinesha and V. K. Agrawal, "Multi-level authentication technique for accessing cloud services," in 2012 International Conference on Computing, Communication and Applications, Dindigul, India, Oct. 2012, pp. 1–4. DOI: https://doi.org/10.1109/ICCCA.2012.6179130

V. K. Pant, J. Prakash, and A. Asthana, "Three step data security model for cloud computing based on RSA and steganography," in 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), Greater Noida, India, Jul. 2015, pp. 490–494. DOI: https://doi.org/10.1109/ICGCIoT.2015.7380514

M. Jensen, S. Schäge, and J. Schwenk, "Towards an Anonymous Access Control and Accountability Scheme for Cloud Computing," in 2010 IEEE 3rd International Conference on Cloud Computing, Miami, FL, USA, Jul. 2010, pp. 540–541. DOI: https://doi.org/10.1109/CLOUD.2010.61

L. Wang and T. Song, "An Improved Digital Signature Algorithm and Authentication Protocols in Cloud Platform," in 2016 IEEE International Conference on Smart Cloud (SmartCloud), New York, NY, USA, Aug. 2016, pp. 319–324. DOI: https://doi.org/10.1109/SmartCloud.2016.46

K. S. Gajghate and R. V. Mante, "Secure Document Sharing and Access Control on Cloud for Corporate User," in 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore, India, Apr. 2018, pp. 135–138. DOI: https://doi.org/10.1109/ICICCT.2018.8473095

P. Sirohi and A. Agarwal, "Cloud computing data storage security framework relating to data integrity, privacy and trust," in 2015 1st International Conference on Next Generation Computing Technologies (NGCT), Dehradun, India, Sep. 2015, pp. 115–118. DOI: https://doi.org/10.1109/NGCT.2015.7375094

R. Fathi, M. A. Salehi, and E. L. Leiss, "User-Friendly and Secure Architecture (UFSA) for Authentication of Cloud Services," in 2015 IEEE 8th International Conference on Cloud Computing, New York, NY, USA, Jun. 2015, pp. 516–523. DOI: https://doi.org/10.1109/CLOUD.2015.75

L. K. ALnwihel and A. R. Khan, "A Novel Cloud Authentication Framework," in 2020 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, Sep. 2020, pp. 1302–1308. DOI: https://doi.org/10.1109/CSCI51800.2020.00243

J. Shen, D. Liu, S. Chang, J. Shen, and D. He, "A Lightweight Mutual Authentication Scheme for User and Server in Cloud," in 2015 First International Conference on Computational Intelligence Theory, Systems and Applications (CCITSA), Ilan, Taiwan, Sep. 2015, pp. 183–186. DOI: https://doi.org/10.1109/CCITSA.2015.47

S. Dey, S. Sampalli, and Q. Ye, "A light-weight authentication scheme based on message digest and location for mobile cloud computing," in 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC), Austin, TX, USA, Sep. 2014, pp. 1–2. DOI: https://doi.org/10.1109/PCCC.2014.7017041

S. H. Na, J. Y. Park, and E. N. Huh, "Personal Cloud Computing Security Framework," in 2010 IEEE Asia-Pacific Services Computing Conference, Hangzhou, China, Sep. 2010, pp. 671–675.

V. Nandina, J. M. Luna, C. C. Lamb, G. L. Heileman, and C. T. Abdallah, "Provisioning Security and Performance Optimization for Dynamic Cloud Environments," in 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, Jun. 2014, pp. 979–981. DOI: https://doi.org/10.1109/CLOUD.2014.150

. S. K. M., "Enhanced Security Framework to Ensure Data Security in Cloud Using Security Blanket Algorithm," International Journal of Research in Engineering and Technology, vol. 02, no. 10, pp. 225–229, Oct. 2013. DOI: https://doi.org/10.15623/ijret.2013.0210033

A. Bhandari, A. Gupta, and D. Das, "A framework for data security and storage in Cloud Computing," in 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), New Delhi, India, Mar. 2016, pp. 1–7. DOI: https://doi.org/10.1109/ICCTICT.2016.7514542

S. C. Patel, R. S. Singh, and S. Jaiswal, "Secure and privacy enhanced authentication framework for cloud computing," in 2015 2nd International Conference on Electronics and Communication Systems (ICECS), Coimbatore, India, Oct. 2015, pp. 1631–1634. DOI: https://doi.org/10.1109/ECS.2015.7124863

V. S. Mahalle and A. K. Shahade, "Enhancing the data security in Cloud by implementing hybrid (Rsa & Aes) encryption algorithm," in 2014 International Conference on Power, Automation and Communication (INPAC), Amravati, India, Jul. 2014, pp. 146–149. DOI: https://doi.org/10.1109/INPAC.2014.6981152

P. Yellamma, C. Narasimham, and V. Sreenivas, "Data security in cloud using RSA," in 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Tiruchengode, India, Jul. 2013, pp. 1–6. DOI: https://doi.org/10.1109/ICCCNT.2013.6726471

S. Verma and S. Ahuja, "A hybrid two layer attribute based encryption for privacy preserving in public cloud," in 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, Dec. 2016, vol. 2, pp. 1–5. DOI: https://doi.org/10.1109/INVENTIVE.2016.7824822

P. Rewagad and Y. Pawar, "Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing," in 2013 International Conference on Communication Systems and Network Technologies, Gwalior, India, Apr. 2013, pp. 437–439. DOI: https://doi.org/10.1109/CSNT.2013.97

P. Garg and V. Sharma, "An efficient and secure data storage in Mobile Cloud Computing through RSA and Hash function," in 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), Ghaziabad, India, Oct. 2014, pp. 334–339. DOI: https://doi.org/10.1109/ICICICT.2014.6781303

S. K. Sood, "A combined approach to ensure data security in cloud computing," Journal of Network and Computer Applications, vol. 35, no. 6, pp. 1831–1838, Nov. 2012. DOI: https://doi.org/10.1016/j.jnca.2012.07.007

S. Dey, S. Sampalli, and Q. Ye, "MDA: message digest-based authentication for mobile cloud computing," Journal of Cloud Computing, vol. 5, no. 1, Nov. 2016, Art. no. 18. DOI: https://doi.org/10.1186/s13677-016-0068-6

Downloads

How to Cite

[1]
A. R. Khan and L. K. . . . Alnwihel, “A Brief Review on Cloud Computing Authentication Frameworks”, Eng. Technol. Appl. Sci. Res., vol. 13, no. 1, pp. 9997–10004, Feb. 2023.

Metrics

Abstract Views: 1177
PDF Downloads: 913

Metrics Information