Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Authentication Methods in Cloud Computing: A Survey

1Mahnoush Babaeizadeh, 2Majid Bakhtiari and 1Alwuhayd Muteb Mohammed
1Department of Computer Science, Faculty of Computing, Universiti Teknologi Malaysia, Skudai 81310, Johor, Malaysia
2Advanced Informatics School, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, Malaysia
Research Journal of Applied Sciences, Engineering and Technology  2015  8:655-664
http://dx.doi.org/10.19026/rjaset.9.1451  |  © The Author(s) 2015
Received: November ‎13, ‎2014  |  Accepted: January ‎27, ‎2015  |  Published: March 15, 2015

Abstract

This study presents a review on the various methods of authentication in cloud environment. Authentication plays an important role in security of Cloud Computing (CC). It protects Cloud Service Providers (CSP) against various types of attacks, where the aim is to verify a user’s identity when a user wishes to request services from cloud servers. There are multiple authentication technologies that verify the identity of a user before granting access to resources.

Keywords:

Authentication, biometric, cloud computing, information security, keystroke authentication, security and privacy,


References

  1. Abhishek, K., S. Roshan, P. Kumar and R. Ranjan, 2013. A comprehensive study on multifactor authentication schemes. Adv. Comput. Inform. Technol., 177: 561-568.
    CrossRef    
  2. Acar, T., M. Belenkiy and A. Küpçü, 2013. Single password authentication. IACR Cryptology ePrint Archive, pp: 167.
  3. Acucmez, O., A. Latifi, J.P. Seifert and X. Zhang, 2008. A trusted mobile phone prototype. Proceeding of 5th IEEE Consumer Communications and Networking Conference (CCNC, 2008).
  4. Akyildiz, E. and M. Ashraf, 2014. An overview of trace based public key cryptography over finite fields. J. Comput. Appl. Math., 259: 599-621.
    CrossRef    
  5. Al-Shebani, Q., P. Premarante and P.J. Vial, 2013. Embedded door access control systems based on face recognition: A survey. Proceeding of 7th International Conference on Signal Processing and Communication Systems (ICSPCS, 2013), pp: 1-7.
    CrossRef    
  6. Anzaku, E.T., H. Sohn and Y.M. Ro, 2010. Multi-factor authentication using fingerprints and user-specific random projection. Proceeding of 12th International Asia-Pacific Web Conference (APWEB, 2010), pp: 415-418.
    CrossRef    
  7. Arriaga, R.I. and S. Vempala, 1999. An algorithmic theory of learning: Robust concepts and random projection. Proceeding of 40th Annual Symposium on Foundations of Computer Science, pp: 616-623.
    CrossRef    
  8. Ayurzana, O., B. Pumbuurei and H. Kim, 2013. A study of hand-geometry recognition system. Proceeding of 8th International Forum on Strategic Technology (IFOST, 2013), 2: 132-135.
    CrossRef    
  9. Babaeizadeh, M., M. Bakhtiari and M. AizainiMaarof, 2014a. Keystroke dynamic authentication in mobile cloud computing. Int. J. Comput. Appl., 90(1): 29-36.
    CrossRef    
  10. Babaeizadeh, M., M. Bakhtiari and M.A. Maarof, 2014b. Authentication method through keystrokes measurement of mobile users in cloud environment. Int. J. Adv. Soft Comput. Appl., 6(3).
  11. Banyal, R.K., P. Jain and V.K. Jain, 2013. Multi-factor authentication framework for cloud computing. Proceeding of 5th International Conference on Computational Intelligence, Modelling and Simulation (CIMSim), pp: 105-110.
    CrossRef    
  12. Behl, A., 2011. Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation. Proceeding of World Congress on Information and Communication Technologies (WICT, 2011), pp: 217-222.
  13. Bhatt, Sh. and T. Santhanam, 2013. Keystroke dynamics for biometric authentication-a survey. Proceeding of International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME), pp: 17-23.
    CrossRef    
  14. Bhattacharyya, D., R. Ranjan, A. FarkhodAlisherov and M. Choi, 2009. Biometric authentication: A review. Int. J. u-and e-Serv. Sci. Technol., 2(3): 13-28.
  15. Bouayad, A., A. Blilat, N. El HoudaMejhed and M. El Ghazi, 2012. Cloud computing: Security challenges. Proceeding of IEEE Colloquium in Information Science and Technology (CIST, 2012), pp: 26-31.
  16. Brainard, J.G., A. Juels, R.L. Rivest, M. Szydlo and M. Yung, 2006. Fourth-factor authentication: Somebody you know. Proceeding of ACM Conference on Computer and Communications Security, pp: 168-178.
    CrossRef    
  17. Cardoso, Â. and A. Wichert, 2012. Iterative random projections for high-dimensional data clustering. Pattern Recogn. Lett., 33(13): 1749-1755.
    CrossRef    
  18. Chen, D.R. and H. Li, 2013. Convergence rates of learning algorithms by random projection. Appl. Comput. Harmon. A., 37(1): 36-51.
    CrossRef    
  19. Chen, J., G. Wu, L. Shen and Z. Ji, 2011. Differentiated security levels for personal identifiable information in identity management system. Expert Syst. Appl., 38(11): 14156-14162.
    CrossRef    
  20. Choras, M. and M. Piotr, 2007. Keystroke dynamics for biometric identification. In: Beliezynski, B. and et al. (Eds.): ICANNGA 2007. Part 2, LNCS 4432, Springer-Verlag, Berlin, Heidelberg, pp: 424-431.
    CrossRef    
  21. Cemal, K. and C. Iki, 2011. A personal identification system using retinal vasculature in retinal fundus images. Expert Syst. Appl., 38(11): 13670-13681.
    CrossRef    
  22. Clarke, N.L. and S.M. Furnell, 2005. Authentication of users on mobile telephones-A survey of attitudes and practices. Comput. Secur., 24(7): 519-527.
    CrossRef    
  23. Crawford, H., R. Karen and S. Tim, 2013. A framework for continuous, transparent mobile device authentication. Comput. Secur., 39: 127-136.
    CrossRef    
  24. Cui, B. and T. Xue, 2009. Design and realization of an intelligent access control system based on voice recognition. Comput. Commun. Control Manage., 1: 229-232.
    CrossRef    
  25. De Clercq, J., 2002. Single sign-on architectures. Infrastructure Secur., 2437: 40-58.
    CrossRef    
  26. Dinesha, H.A. and V.K. Agrawal, 2012. Multi-level authentication technique for accessing cloud services. Proceeding of International Conference on Computing, Communication and Applications (ICCCA, 2012), pp: 1-4.
    CrossRef    
  27. Duta, N., 2009. A survey of biometric technology based on hand shape. Pattern. Recogn., 42(11): 2797-2806.
    CrossRef    
  28. Ekberg, J.E., 2007. Mobile Trusted Module (MTM) -an introduction.
    Direct Link
  29. Ferrer, M.A., A. Morales, C.M. Travieso and J.B. Alonso, 2007. Low cost multimodal biometric identification system based on hand geometry, palm and finger print texture. Proceeding of 41st Annual IEEE International Carnahan Conference on Security Technology, pp: 52-58.
    CrossRef    
  30. Gordon, S.D., J. Katz, R. Kumaresan and A. Yerukhimovich, 2010. Authenticated broadcast with a partially compromised public-key infrastructure. In: Dolev, S. and et al. (Eds.), SSS 2010. LNCS 6366, Springer-Verlag, Berlin Heidelberg, pp: 144-158.
    CrossRef    
  31. Grossschadl, J., T. Vejda and D. Page, 2008. Reassessing the TCG specifications for trusted computing in mobile and embedded systems. Proceeding of IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2008), pp: 84-90.
    CrossRef    
  32. Gurav, S.M., L.S. Gawade, P.K. Rane and N.R. Khochare, 2014. Graphical password authentication: Cloud securing scheme. Proceeding of IEEE Electronic Systems, Signal Processing and Computing Technologies (ICESC, 2014), pp: 479-483.
  33. Haidar, A.N. and A.E. Abdallah, 2009. Formal modelling of pki based authentication. Electron. Notes Theor. Comput. Sci., 235: 55-70.
    CrossRef    
  34. Jafri, R. and H.R. Arabnia, 2009. A survey of face recognition techniques. J. Inform. Process. Syst., 5(2): 41-68.
    CrossRef    
  35. Jain, A.K., S. Prabhakar, L. Hong and S. Pankanti, 2000. Filterbank-based fingerprint matching. IEEE T. Image Process., 9(5): 846-859.
    CrossRef    
  36. Jarng, S.S., 2011. HMM voice recognition algorithm coding. Proceeding of International Conference on Information Science and Applications (ICISA, 2011), pp: 1-7.
  37. Jeong, H. and E. Choi, 2012. User authentication using profiling in mobile cloud computing. AASRI Procedia, 2: 262-267.
    CrossRef    
  38. Jiang, X.C. and J.D. Zheng, 2014. An indirect fingerprint authentication scheme in cloud computing. Appl. Mech. Mater., 484: 986-990.
    CrossRef    
  39. Jivanadham, L.B., A.K.M. Islam, Y. Katayama, S. Komaki and S. Baharun, 2013. Cloud Cognitive Authenticator (CCA): A public cloud computing authentication mechanism. Proceeding of International Conference on Informatics, Electronics and Vision (ICIEV, 2013), pp: 1-6.
  40. Jog, M. and M. Madiajagan, 2012. Cloud computing: Exploring security design approaches in infrastructure as a service. Proceeding of International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM, 2012), pp: 156-159.
  41. Jula, A., E. Sundararajan and Z. Othman, 2014. Cloud computing service composition: A systematic literature review. Expert Syst. Appl., 41(8): 3809-3824.
    CrossRef    
  42. Kar, S., S. Hiremath, D.G. Joshi, V.K. Chadda and A. Bajpai, 2006. A multi-algorithmic face recognition system. Adv. Comput. Commun., 3: 321-326.
    CrossRef    
  43. Karnan, M., M. Akila and N. Krishnaraj, 2011. Biometric personal authentication using keystroke dynamics: A review. Appl. Soft. Comput., 11(2): 1565-1573.
    CrossRef    
  44. Khalid, U., A. Ghafoor, M. Irum and M.A. Shibli, 2012. Cloud based secure and privacy enhanced authentication and authorization protocol. Procedia Comput. Sci., 22: 680-688.
    CrossRef    
  45. Kim, M., H. Ju, Y. Kim, J. Park and Y. Park, 2010. Design and implementation of mobile trusted module for trusted mobile computing. IEEE T. Consum. Electr., 56(1): 134-140.
    CrossRef    
  46. Kong, A., D. Zhang and M. Kamel, 2009. A survey of palmprint recognition. Pattern Recogn., 42(7): 1408-1418.
    CrossRef    
  47. Liu, M., 2010. Fingerprint classification based on Adaboost learning from singularity features. Pattern. Recogn., 43(3): 1062-1070.
    CrossRef    
  48. Lone, M.A., S.M. Zakariya and R. Ali, 2011. Automatic face recognition system by combining four individual algorithms. Proceeding of International Conference on Computational Intelligence and Communication Networks (CICN), pp: 222-226.
    CrossRef    
  49. Manvi, S.S. and G. Krishna Shyam, 2013. Resource management for infrastructure as a Service (IaaS) in cloud computing: A survey. J. Netw. Comput. Appl., 41: 424-440.
    CrossRef    
  50. Pearson, S., Y. Shen and M. Mowbray, 2009. A privacy manager for cloud computing. In: Jaatun, M.G., G. Zhao and C. Rong (Eds.), CloudCom 2009. LNCS 5931, Springer, Berlin, Heidelberg, pp: 90-106.
    CrossRef    
  51. Pointcheval, D. and S. Zimmer, 2008. Multi-factor Authenticated Key Exchange. In: Bellovin, S.M. (Eds.), ACNS. Springer-Verlag, Berlin, Heidelberg, pp: 277-295.
    CrossRef    
  52. Polat, Ö. and T. Yildirim, 2008. Hand geometry identification without feature extraction by general regression neural network. Expert Syst. Appl., 34(2): 845-849.
    CrossRef    
  53. Popovic, K. and Z. Hocenski, 2010. Cloud computing security issues and challenges. Proceeding of the 33rd International Convention on MIPRO, 2010.
  54. Qiao, Y., X. Jiang, H.W. Lin and J.S. Pan, 2012. Efficient identity based threshold proxy signature scheme in cloud environment. Proceeding of International Conference on Information Security and Intelligence Control (ISIC, 2012), pp: 53-56.
    CrossRef    
  55. Radha, V. and D.H. Reddy, 2012. A survey on single sign-on techniques. Procedia. Technol., 4: 134-139.
    CrossRef    
  56. Ramgovind, S., M.M. Eloff and E. Smith, 2010. The management of security in cloud computing. Proceeding of Information Security for South Africa (ISSA), pp: 1-7.
  57. Revar, A.G. and M.D. Bhavsar, 2011. Securing user authentication using single sign-on in cloud computing. Proceeding of International Conference on Engineering (NUiCONE), pp: 1-4.
    CrossRef    
  58. Ricco, S. and M. Chen, 2009. Classification of scan location in retinal optical coherence tomography. Proceeding of Biomedical Imaging: From Nano to Macro (ISBI'09), pp: 1031-1034.
  59. Schmidt, A.U., N. Kuntze and M. Kasper, 2008. On the deployment of mobile trusted modules. Proceeding of IEEE Wireless Communications and Networking Conference (WCNC, 2008), pp: 3169-3174.
    CrossRef    
  60. Sharma, P., S.K. Sood and S. Kaur, 2011. Security issues in cloud computing. In: Mantri, A. (Ed.), High Performance Architecture and Grid Computing. Springer-Verlag, Berlin, Heidelberg, pp: 36-45.
    CrossRef    PMCid:PMC3263158    
  61. Sidlauskas, D.P. and S. Tamer, 2008. Hand geometry recognition. In: Jain, A.K., P. Flynn and A.A. Ross (Eds.), Handbook of Biometrics. Springer, US, Boston, pp: 91-107.
    CrossRef    
  62. Su, S. and S. Lü, 2012. A public key cryptosystem based on three new provable problems. Theor. Comput. Sci., 426: 91-117.
    CrossRef    
  63. Subashini, S. and V. Kavitha, 2011. A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl., 34(1): 1-11.
    CrossRef    
  64. Wang, X., G. Fangxia and M. Jian-feng, 2012. User authentication via keystroke dynamics based on difference subspace and slope correlation degree. Dig. Signal. Process., 22(5): 707-712.
    CrossRef    
  65. LI id="Ref65"> Winkler, 2011. Cloud computing architecture in securing the cloud. Syngress, pp: 29-53.
  66. Wu, L., S. Kumar Garg and R. Buyya, 2012. SLA-based admission control for a software-as-a-service provider in cloud computing environments. J. Comput. Syst. Sci., 78(5): 1280-1299.
    CrossRef    
  67. Xie, G. and B. Yao, 2013. Cloud storage identity design based on fingerprint identification. Proceeding of 6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), 1: 569-572.
    CrossRef    
  68. Yassin, A.A., H. Jin, A. Ibrahim and D. Zou, 2012. Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing. Proceeding of 2nd International Conference on Cloud and Green Computing (CGC, 2012), pp: 282-289.
    CrossRef    
  69. Zissis, D. and D. Lekkas, 2012. Addressing cloud computing security issues. Future. Gener. Comp. Sy., 28: 583-592.
    CrossRef    
  70. Ziyad, S. and A. Kannammal, 2014. A Multifactor Biometric Authentication for the Cloud. Adv. Intell. Syst. Comput., 246: 395-403.
    CrossRef    

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved