Authenticating users with multiple levels of validations in a secure Cloud Computing Environment

Pranayanath Reddy Anantula*, G. Manoj Someswar**
* Assistant Professor, Department of Computer Science and Engineering, Alliance University, Bangalore, Karnataka, India.
** Director General & Scientist-G, Global Research Academy, Hyderabad, Telangana, India.
Periodicity:May - July'2016
DOI : https://doi.org/10.26634/jcc.3.3.8296

Abstract

In the current digital technology world, all the applications are moving into cloud environment. The biggest challenge is to maintain the security and privacy of the application in cloud. One of the basic security features that normally applied in any application is Authentication of Users using valid user id and password. Authenticating users only on these two parameters will not assure that the user who had entered these details is an actual user. Recently most of the applications are using two factor authentications (OTP's) over the user id and password. In cloud computing environment we can use different authentication functionalities depending upon the customer requirements. In this paper we will explore eight authentication functionalities and discuss their pros and con's in implementing them in the applications. For strong level of security, two or more functionalities can be combined and implemented in the application to validate the credentials of the user.

Keywords

Authentication, OTP, IP Range Restriction, Session Security

How to Cite this Article?

Anantula, P. R., and Someswar, G. M. (2016). Resolving Authenticating users with multiple levels of validations in a secure Cloud Computing Environment. i-manager’s Journal on Cloud Computing, 3(3), 9-17. https://doi.org/10.26634/jcc.3.3.8296

References

[1]. D. Jayalatchumy, P. Ramkumar, and D. Kadhirvelu, (2010). “Preserving Privacy through Data Control in a Cloud Computing Architecture using Discretion Algorithm”. Third International Conference on Emerging Trends in Engineering and Technology, IEEE, DOI 10.1109/ICETET.2010.103.
[2]. Wang, B., Baochun, and Wang, H.L. (2012). “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud”. IEEE Fifth International Conference on Cloud Computing, DOI 10.1109/CLOUD.2012.46.
[3]. W., Jian; Y, Wang., J, Shuo, and Le, Jiajin., (2009). “Providing Privacy Preserving in cloud computing”. International Conference on Test and Measurement, IEEE, ICTM.
[4]. Syed, M.R., and F, Mohammad, (2012). “PccP: A Model for Preserving Cloud Computing Privacy”. IEEE International Conference on Data Science and Engineering (ICDSE).
[5]. Delina Beh Mei Yin, et al., (2016). “Electronic Door Access Control using My Access Two-Factor Authentication Scheme featuring Near-Field Communication and Eigenface-based Face Recognition using Principal Component Analysis”. 10 International Conference on Ubiquitous Information Management and Communication, ACM.
[6] Thanasis Petsas, et al., (2015). “Two-factor authentication: Is the world ready?: Quantifying 2FA adoption”. Eighth European Workshop on System Security, (EuroSec '15) ACM.
[7]. Wikipedia, (n.d.). One-time Password. Retrieved from: https://en.wikipedia.org/wiki/One-time_password
[8]. UserGuide: How to be Successful with Salesforce. Winter '16 Edition.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.