Abstract

In the current digital technology world, all the applications are moving into cloud environment. The biggest challenge is to maintain the security and privacy of the application in cloud. One of the basic security features that normally applied in any application is Authentication of Users using valid user id and password. Authenticating users only on these two parameters will not assure that the user who had entered these details is an actual user. Recently most of the applications are using two factor authentications (OTP's) over the user id and password. In cloud computing environment we can use different authentication functionalities depending upon the customer requirements. In this paper we will explore eight authentication functionalities and discuss their pros and con's in implementing them in the applications. For strong level of security, two or more functionalities can be combined and implemented in the application to validate the credentials of the user.

Keywords
Authentication, OTP, IP Range Restriction, Session Security

Purchase Instant Access

PDF
10
USD

250
INR

HTML
10
USD

250
INR

Username / Email
Password
Don't have an account?  Sign Up
  • If you would like institutional access to this content, please recommend the title to your librarian.
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.

We strive to bring you the best. Your feedback is of great value to us. Feel free to post your comments and suggestions.