Open Access   Article Go Back

A Study on Authentication Issues in Cloud Computing Environment

Dulal Kumbhakar1 , Sunil Karforma2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-01 , Page no. 138-142, Jan-2019

Online published on Jan 20, 2019

Copyright © Dulal Kumbhakar, Sunil Karforma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Dulal Kumbhakar, Sunil Karforma, “A Study on Authentication Issues in Cloud Computing Environment,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.01, pp.138-142, 2019.

MLA Style Citation: Dulal Kumbhakar, Sunil Karforma "A Study on Authentication Issues in Cloud Computing Environment." International Journal of Computer Sciences and Engineering 07.01 (2019): 138-142.

APA Style Citation: Dulal Kumbhakar, Sunil Karforma, (2019). A Study on Authentication Issues in Cloud Computing Environment. International Journal of Computer Sciences and Engineering, 07(01), 138-142.

BibTex Style Citation:
@article{Kumbhakar_2019,
author = {Dulal Kumbhakar, Sunil Karforma},
title = {A Study on Authentication Issues in Cloud Computing Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {07},
Issue = {01},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {138-142},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=609},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=609
TI - A Study on Authentication Issues in Cloud Computing Environment
T2 - International Journal of Computer Sciences and Engineering
AU - Dulal Kumbhakar, Sunil Karforma
PY - 2019
DA - 2019/01/20
PB - IJCSE, Indore, INDIA
SP - 138-142
IS - 01
VL - 07
SN - 2347-2693
ER -

           

Abstract

Cloud computing is the new emerging technology and its real trends toward massively scalable various computing services. Cloud computing services are used widely to foster the business volume of an organization or industry based on delivery and consumption of everything from storage to computing management services with minimum effort. Regarding to this importance, the service providers of this technology needs to address many issues related to the cloud computing environment security issues like privacy, authentication and integrity issues etc. Many researchers worked on these issues and provide the possible mechanisms to resolve the issues. However our paper represents a critical study on authentication issues in cloud computing environment.

Key-Words / Index Term

Cloud Computing, Authentication Issues, Research Issues and Challenges

References

[1] Michael Cooney,”Gartner:How big trends in security, mobile, big data and cloud computing will change IT” oct-30,2012.
[2] National Institute of Standards and Technology, U.S. Department of Commerce,”NIST Cloud Computing Program “ sp 500-322.
[3] Paul A. Strassmann, the former Director of Defense Information, U.S. Department of Defense,” Problems with authentication ” Apr.-2002.
[4] A. A. Yassin, H. Jin, Ayad Ibrahim, Weizhong Qiang and Deqing Zou,” Efficient Password-based Two Factors Authentication in Cloud Computing”, International Journal of Security and Its Applications ,Vol. 6, No. 2, April, 2012.
[5] A. Varghese, Er. D. Mathews,”Securing SMS based approach for two factor authentication”,IJRCCT,pp.25-28,2014.
[6] K. Wong, M. Kim,” Towards Biometric – based Authentication for Cloud Computing “,In Proceedings of the 2nd International Conference on Cloud Computing and Services Science, pages 501-510, 2012.
[7] A. Singh, Dr. M. Bala, S. Kaur, “Classification of data using multi-level authentication in cloud computing” , International Education & Research Journal,Vol.3, Issue.5, pp.114-117,May-2017.Education& Research Journ
[8] A. Krishna K, B. A S, “ Authentication Model for Cloud Computing using Single Sign –on”, International Journal of Advanced Computational Engineering and Networking, Volume-2, Issue-12, pp.55-60, Dec.-2014
[9] H. Chang, E. Choi, “ User Authentication in cloud computing “, Springer,CCSI-151,pp.338-342, 2011.
[10] J. Chhetiza, N. Kumar, “ A Survey of Security Issues and Authentication Mechanism in Cloud Environment with Focus on Multifactor Authentication “, International Journal of Advanced Research in Computer Science and Software Engineering “, vol.6, Issue.5, pp.792-798, 2016.
[11] S. Y. Lim, M.L. Kiah, T. F.Ang, “ Security Issues and Future Challenges of Cloud Service Authentication “,Acta Polytechnica Hungarica, vol.14, No.2, 2017.
[12] M. Ahmadi, M. vali, F. Moghaddam, A. Hakemi, K. Madadipouya,” A Reliable User Authentication and Data Protection Model in Cloud Computing Environments”, ICISCA, 2015.
[13] Mrs. S.M. Barhate, Dr. M.P.Dhore, “ User Authentication Issues in Cloud Computing “, IOSR-JCE, pp.30-35,2016.
[14] S. Singla, J. Sigh, “ Cloud Data Security using Authentication and Encryption Technique “ ,Global Journal of Computer Science and Technology , vol.13,Issue .3, Ver. 1.0, 2013.
[15] R. Gajula,Dr. A.M.Qyser, N. Rajender,” Combining Two Factor Authentication and Public Key Encryption to Ensure the Authentication in Cloud Computing”,International Journal of Recent Trends in Engineering & Research, pp.118-121,2017.
[16] S.A. Adam, A. Yousif, M.B. Bashir, “ Multilevel Authentication Scheme for Cloud Computing “,International Journal of Grid and Distributed Computing, Vol. 9, No. 9 , pp.205-212,2016.
[17] B. Sumitra, C.R.Pethuru, M.Misbahuddin, “A Survey of Cloud Authentication Attacks and Solutions Approaches”, International Journal of Innovative Research in Computer and Communication Engineering “ Vol.2, Issue .10, pp.6245-6253, 2014.