A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure

نویسندگان

چکیده

The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication access control are the most significant concerns computing. Several researchers this field suggest numerous approaches to enhance authentication towards robustness. User names associated passwords have been a common practice for long as Single Factor Authentication. However, advancements speed simple methods, starting from Brute Force technique implementation advanced efficient crytographic algorithms, posed several threats vulnerabilities systems, leading degradation their effectiveness. Multi-factor has emerged robust means securing using simultaneous multiple factors. This employs levels cascaded checks. paper covers an extensive systematic survey factors adoption suitability multi-factor mechanisms. inference drawn terms arriving at unique factor does not require any additional, specialized hardware or software authentication. Such also uses distinct biometric characteristics concerned user process. arrangement augments secured mechanism assessed effective against impersonation attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-Factor Authentication: A Survey †

Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communications, access right management, etc. This work sheds light on the evolution of authentication systems towards Multi-Factor Authentication (MFA) st...

متن کامل

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

Multi-Authentication for Cloud Security: A Framework

Cloud computing is a multi-tenant computational paradigm that offers an efficient, elastic and scalable business model for organizations to adopt various information technology (IT) resources i.e. software, hardware, network, storage, bandwidth etc. There are various aspects of security problem in cloud computing field which include data security, privacy and users’ authenticity. The purpose of...

متن کامل

DPCA: Dual Phase Cloud Infrastructure Authentication

Every user appreciates the security of their data irrespective of its sensitivity. At the same time, user does not want to be held up with the legacy systems, which may be strongly secured but not with fantasy. Network travelled many phases of its own such as internet, intranet, wireless network, sensor network, Ad-hoc network, Mobile network, Blue-tooth, Cloud and IoT, the most popular techniq...

متن کامل

Two Factor Authentication for Cloud Computing

— The fast-emerging of cloud computing technology today has sufficiently benefited its wide range of users from individuals to large organizations. It carries an attractive characteristic by renting myriad virtual storages, computing resources and platform for users to manipulate their data or utilize the processing resources conveniently over Internet without the need to know the exact underly...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Future Internet

سال: 2023

ISSN: ['1999-5903']

DOI: https://doi.org/10.3390/fi15040146