Open Access   Article Go Back

A Systemic Review of Various Multifactor Authentication Schemes

Charanjeet Singh1 , Tripat Deep Singh2

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-2 , Page no. 503-510, Feb-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.503510

Online published on Feb 28, 2019

Copyright © Charanjeet Singh, Tripat Deep Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Charanjeet Singh, Tripat Deep Singh, “A Systemic Review of Various Multifactor Authentication Schemes,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.503-510, 2019.

MLA Style Citation: Charanjeet Singh, Tripat Deep Singh "A Systemic Review of Various Multifactor Authentication Schemes." International Journal of Computer Sciences and Engineering 7.2 (2019): 503-510.

APA Style Citation: Charanjeet Singh, Tripat Deep Singh, (2019). A Systemic Review of Various Multifactor Authentication Schemes. International Journal of Computer Sciences and Engineering, 7(2), 503-510.

BibTex Style Citation:
@article{Singh_2019,
author = {Charanjeet Singh, Tripat Deep Singh},
title = {A Systemic Review of Various Multifactor Authentication Schemes},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {7},
Issue = {2},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {503-510},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3695},
doi = {https://doi.org/10.26438/ijcse/v7i2.503510}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i2.503510}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3695
TI - A Systemic Review of Various Multifactor Authentication Schemes
T2 - International Journal of Computer Sciences and Engineering
AU - Charanjeet Singh, Tripat Deep Singh
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 503-510
IS - 2
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
507 282 downloads 107 downloads
  
  
           

Abstract

With the advancement in information technology, use of cloud has gained rapid acceptance. The usage of such public infrastructures not only increase the risk of data theft but also raise concerns for providing better security to data and resources. One aspect of security deals with authentication method that is used to gain access to the resources over these shared platforms. Strong authentication technique lays foundation for data protection. Simple username-password schemes (single factor) have been proved to be insecure and insufficient in providing secured access thereby urging the need for multifactor authentication (MFA) schemes. Multifactor authentication schemes not only provide an extra layer of security but are also robust against various types of network attacks. The objective of this paper is to review the various multifactor authentication schemes and models that are used to verify the identity of users. This paper highlights the technique, multi-layer cybersecurity strategy, strengths and weaknesses of various schemes with the view to enhance security.

Key-Words / Index Term

Authentication, Multifactor, Security, Passwords, Attack

References

[1] S. M.Sujatha. ,Y. U. Devi, “Design and implementation of IoT testbed with three factor Authentication”, In the Proceedings of the 2016 International Conference on Communication and Electronics Systems (ICCES),IEEE,2016.
[2] M. Sunita, R. Syal, “ Authentication Scheme in Cloud Computing : A Review”, In the Proceedings of the 2017 Second International Conference on Electrical, Computer and Communication Technologies(ICECCT),2017
[3] H. Fujii, Y. Tsuruoka , “SV-2FA: Two-Factor User Authentication with SMS and Voiceprint Challenge Response”, In the Proceedings of the 8th International Conference for Internet Technology and Secured Transactions (ICITST -2013),IEEE pp-283-287, 2013.
[4] A. P. Sabzeva, A. Stavrou, “Universal Multi-Factor Authentication Using Graphical Passwords”, In the Proceedings of the IEEE International Conference on Signal Image Technology and Internet Based Systems, SITIS`08, pp. 625-632 ,2008.
[5] A.Joshi, S. Kumar, R.H. Goudar, “A More Multifactor Secure Authentication Scheme Based On Graphical Authentication”, In the Proceedings of the International Conference on Advances in Computing and Communications (ICACC),IEEE, pp.186-189,2012.
[6] H. Parmar, N. Nainan, S.Thaseen ,”Generation Of Secure One-Time Password Based On Image Authentication”. Journal of Computer Science and Information Technology, No.7, pp.195-206,2012.
[7] L. Varghese, N. Mathew, S. Saju, V. K. Prasad, “3-Level Password Authentication System”, International Journal of Recent Development in Engineering and Technology, ISSN 2347 - 6435 (Online) Volume 2, Issue 4, April 2014.
[8] V. K. Vemuri, S. D. V. Prasad, “A Secure Authentication System by Using Three Level security”, International Journal of Engineering Science and Computing, ISSN-2321-3361, pp.344-348, 2014.
[9] A. A. Yassin, A. A.Hussain, K. A.-A. Mutlaq, “Cloud Authentication Based on Encryption of Digital Image Using Edge Detection”, International Symposium on Artificial Intelligence and signal Processing (AISP), 2015
[10] A. Abdellaoui, Y. I. Khamlichi, H. Chaoui, “Out-of-band Authentication Using Image-Based One Time Password in the Cloud Environment”, International Journal of Security and Its Applications Vol.9, No.12 , pp.35-46 ,2015.
[11] A. Abdellaoui, Y. I. Khamlichi, H.Chaoui, “ A Novel Strong Password Generator for Improving Cloud Authentication”, In the Proceedings of the International Conference on Computational Modeling and Security (CMS 2016), Procedia Computer Science 85 ) pp.293 – 300 ,2016
[12] M. Aldwairi ,R. Masri, H. Hassan, M. E. Barachi , “A Novel Multi-Stage Authentication System for Mobile Applications”, International Journal of Computer Science and Information Security, Vol 14, Issue 7, 2016.
[13] M. Meena, H. S. Lamba , D. Taterwal , M. Shaikh , “System For 3 Level Security Verification Using Image Based Authentication & OTP”, IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN 2278-8719,Volume 13, pp. 46-52, 2018.
[14] F. Aloul, S. Zahidi, W. EI-Hajj, "Two factor authentication using mobile phones", In the proceedings of the International Conference on Computer Systems and Applications 2009. AICCSA 2009. IEEE/ACS, pp. 641-644, 10-13 May 2009.
[15] J. C. Liou and S. Bhashyam, “A Feasible and Cost Effective Two-Factor Authentication for Online Transactions”, In the Proceedings of the 2nd International Conference on Software Engineering and Data Mining, IEEE, pp.47-51, June 2010.
[16] S. K. Nayak, S. Mohapatra, B. Majhi, “An Improved Mutual Authentication Framework for Cloud Computing” International Journal of Computer Applications, Volume 52, issue. 5, August 2012.
[17] A. M. Abdul, S. Jena, M. Balraju, “Dual Factor Authentication To Procure Cloud Services”, In the Proceedings of the 2016 Fourth International Conference on Parallel,Distributed and Grid Computing(PDGC),IEEE,2016
[18] R. K. Banyal , P.Jain, V. K. Jain , “Multifactor Authentication Framework for Cloud Computing”, In the Proceedings of the Fifth International Conference on Computational Intelligence, Modeling and Simulation, IEEE, 2013.
[19] I. A. Althamary, E. M. El-Alfy, “A More Secure Scheme For CAPTCHA-Based Authentication In Cloud Environment”, In the Proceedings of the 8th International Conference on Information Technology (ICIT), Jordan, May 2017.
[20] J.- J. Kim, S.-P. Hong , “A Method of Risk Assessment for Multi-Factor Authentication.” Journal of Information Processing Systems, pp. 187-198,2011.
[21] M. M. Mohammed, M. Elsadig, “A multi-layer of multi factors authentication model for online banking services”, In the Proceedings of the 2013 International Conference on Computing Electrical and Electronics Engineering (ICCEEE), pp. 220-224, 26–28 August, 2013.
[22] S. H. Khan, M. A. Akbar, “Multi-Factor Authentication on Cloud”, In the Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, pp. 1-7, 2015.
[23] Z. Han, L. Yang, Q. Liu, “A Novel Multifactor Two-Server Authentication Scheme under the Mobile Cloud Computing”, In the Proceedings of the 2017 International Conference Networking and Network Applications (NaNA), pp. 341-346, 2017.
[24] R. D. Pietro, M. Gianluigi, M. A. Strangio, “ A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions”, In the Proceedings of the International Conference on Mobile Business (ICMB’05), 2005.
[25] S. Lee, I. Ong, H. T. Lim, H. J. Lee, “Two factor authentication for cloud computing”, International Journal of KIMICS, vol 8, pp. 427-432,2010
[26] M .H. Eldefrawy, M. K. Khan, K. Alghathbar, “OTP-Based Two-Factor Authentication Using Mobile Phones”, In the Proceedings of the 2011 Eighth International Conference on Information Technology: New Generations (ITNG), Las Vegas, NV, pp. 327-331,2011.
[27] M. Singh, S. Singh, “Design and Implementation of Multi-tier Authentication Scheme in Cloud”, International Journal of Computer Science Issues(IJCSI), ISSN (Online):1694-0814, Vol. 9, Issue 5, No 2, pp. 181-187,September 2012.
[28] A. H. M. Emam, “Additional Authentication and Authorisation using Registered Email-ID for Cloud Computing”, International Journal of Soft Computing and Engineering (IJSCE), ISSN : 2231-2307, Vol 3, Issue 2, May 2013.
[29] K. W. Hussein, Dr. N. F. M. Sani, Dr. R. Mahmod, Dr. M. T. Abdullah, “ Design and Implementation of Multi Factor Mechanism for Secure Authentication System”, International Journal of Computer Science and Information Security,Vol. 11, No. 7,pp.31-37, July 2013.
[30] N. Kaur, M. Devgan, S. Bhushan, “Robust Login Authentication Using Time-Based OTP Through Secure Tunnel”, In the Proceedings of the 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 3222-3226, 2016.
[31] A. J. Choudhury ,M. Sain, H. Jae-Lee, , H. Lim, P. Kumar, "A Strong User Authentication Framework for Cloud Computing" , In the Proceedings of the 2011 IEEE Asia -Pacific Services Computing Conference(APSCC), Jeju, Jeju Island Korea (South), pp. 110-115,2011.
[32] O. M. Candan, A. Levi, “Robust Two-factor Smart Card Authentication”, In the Proceedings of the IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom),IEEE,2017.