A Secure Two-Factor Authentication Framework in Cloud Computing
Cloud computing technology has brought tremendous evaluation in the arena of IT (information technology). This technology paves the path of starting business with lowest investment by availing infrastructure as a service (IAAS), platform as a service (PAAS) and software as a service (SAAS) pay per u...
Gespeichert in:
Veröffentlicht in: | Security and communication networks 2022-03, Vol.2022, p.1-9 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 9 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | Security and communication networks |
container_volume | 2022 |
creator | kaur, Sandeep kaur, Gaganpreet Shabaz, Mohammad |
description | Cloud computing technology has brought tremendous evaluation in the arena of IT (information technology). This technology paves the path of starting business with lowest investment by availing infrastructure as a service (IAAS), platform as a service (PAAS) and software as a service (SAAS) pay per uses model. Cloud computing services can be quickly and easily provisioned and discharged with minimum efforts and service provider (SP) relationship. Cloud computing characteristics such as on demand self-service, broad network access, resource pooling, and rapid elasticity lead the demand of computing. Despite these features, this platform is free to security issues and attacks specifically in terms of communication because of unsecure authentication and privacy. However, strong user authentication procedure impedes illegal access to the SP which is the principal requirement for securing cloud computing ecosystem. In this regard, we attempt to propose possible counter measures for the cloud ecosystem. Hence, this paper presented a novel one way hash and nonce-based two-factor secure authentication scheme with traditional user IDs, password, and OTP verification procedure that resist brute force attack, session and account hijacking attack, MITM attacks, and replay attacks. |
doi_str_mv | 10.1155/2022/7540891 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2640851295</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2640851295</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-2b93a4815a0109d8c90b4ab7f83b3307e20d35f9b0b9ac49f7bf0a529b020c763</originalsourceid><addsrcrecordid>eNp9kE1LAzEQhoMoWD9u_oCAR107-Wo2JymLVaHgwXoOSTZrU9tNzWYp_nu3tHj0NMPwMC_vg9ANgQdChBhToHQsBYdSkRM0IoqpAgilp3874efooutWABPCJR-hxyl-965PHi92sZgZl2PC0z4vfZuDMznEFs-S2fhdTF84tLhax77GVdxs-xzazyt01ph156-P8xJ9zJ4W1Usxf3t-rabzwjEmc0GtYoaXRBggoOrSKbDcWNmUzDIG0lOomWiUBauM46qRtgEj6HCg4OSEXaLbw99tit-977JexT61Q6Smk6GwIFSJgbo_UC7Frku-0dsUNib9aAJ6r0jvFemjogG_O-DL0NZmF_6nfwG_-GPw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2640851295</pqid></control><display><type>article</type><title>A Secure Two-Factor Authentication Framework in Cloud Computing</title><source>Wiley Online Library Open Access</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>kaur, Sandeep ; kaur, Gaganpreet ; Shabaz, Mohammad</creator><contributor>Nazir, Shah ; Shah Nazir</contributor><creatorcontrib>kaur, Sandeep ; kaur, Gaganpreet ; Shabaz, Mohammad ; Nazir, Shah ; Shah Nazir</creatorcontrib><description>Cloud computing technology has brought tremendous evaluation in the arena of IT (information technology). This technology paves the path of starting business with lowest investment by availing infrastructure as a service (IAAS), platform as a service (PAAS) and software as a service (SAAS) pay per uses model. Cloud computing services can be quickly and easily provisioned and discharged with minimum efforts and service provider (SP) relationship. Cloud computing characteristics such as on demand self-service, broad network access, resource pooling, and rapid elasticity lead the demand of computing. Despite these features, this platform is free to security issues and attacks specifically in terms of communication because of unsecure authentication and privacy. However, strong user authentication procedure impedes illegal access to the SP which is the principal requirement for securing cloud computing ecosystem. In this regard, we attempt to propose possible counter measures for the cloud ecosystem. Hence, this paper presented a novel one way hash and nonce-based two-factor secure authentication scheme with traditional user IDs, password, and OTP verification procedure that resist brute force attack, session and account hijacking attack, MITM attacks, and replay attacks.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2022/7540891</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Authentication ; Cloud computing ; Cryptography ; Data encryption ; Information technology ; Privacy ; Security management ; Software-as-a-service</subject><ispartof>Security and communication networks, 2022-03, Vol.2022, p.1-9</ispartof><rights>Copyright © 2022 Sandeep kaur et al.</rights><rights>Copyright © 2022 Sandeep kaur et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-2b93a4815a0109d8c90b4ab7f83b3307e20d35f9b0b9ac49f7bf0a529b020c763</citedby><cites>FETCH-LOGICAL-c337t-2b93a4815a0109d8c90b4ab7f83b3307e20d35f9b0b9ac49f7bf0a529b020c763</cites><orcidid>0000-0001-5106-7609 ; 0000-0001-8679-0258 ; 0000-0002-3322-1315</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27903,27904</link.rule.ids></links><search><contributor>Nazir, Shah</contributor><contributor>Shah Nazir</contributor><creatorcontrib>kaur, Sandeep</creatorcontrib><creatorcontrib>kaur, Gaganpreet</creatorcontrib><creatorcontrib>Shabaz, Mohammad</creatorcontrib><title>A Secure Two-Factor Authentication Framework in Cloud Computing</title><title>Security and communication networks</title><description>Cloud computing technology has brought tremendous evaluation in the arena of IT (information technology). This technology paves the path of starting business with lowest investment by availing infrastructure as a service (IAAS), platform as a service (PAAS) and software as a service (SAAS) pay per uses model. Cloud computing services can be quickly and easily provisioned and discharged with minimum efforts and service provider (SP) relationship. Cloud computing characteristics such as on demand self-service, broad network access, resource pooling, and rapid elasticity lead the demand of computing. Despite these features, this platform is free to security issues and attacks specifically in terms of communication because of unsecure authentication and privacy. However, strong user authentication procedure impedes illegal access to the SP which is the principal requirement for securing cloud computing ecosystem. In this regard, we attempt to propose possible counter measures for the cloud ecosystem. Hence, this paper presented a novel one way hash and nonce-based two-factor secure authentication scheme with traditional user IDs, password, and OTP verification procedure that resist brute force attack, session and account hijacking attack, MITM attacks, and replay attacks.</description><subject>Authentication</subject><subject>Cloud computing</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Information technology</subject><subject>Privacy</subject><subject>Security management</subject><subject>Software-as-a-service</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kE1LAzEQhoMoWD9u_oCAR107-Wo2JymLVaHgwXoOSTZrU9tNzWYp_nu3tHj0NMPwMC_vg9ANgQdChBhToHQsBYdSkRM0IoqpAgilp3874efooutWABPCJR-hxyl-965PHi92sZgZl2PC0z4vfZuDMznEFs-S2fhdTF84tLhax77GVdxs-xzazyt01ph156-P8xJ9zJ4W1Usxf3t-rabzwjEmc0GtYoaXRBggoOrSKbDcWNmUzDIG0lOomWiUBauM46qRtgEj6HCg4OSEXaLbw99tit-977JexT61Q6Smk6GwIFSJgbo_UC7Frku-0dsUNib9aAJ6r0jvFemjogG_O-DL0NZmF_6nfwG_-GPw</recordid><startdate>20220312</startdate><enddate>20220312</enddate><creator>kaur, Sandeep</creator><creator>kaur, Gaganpreet</creator><creator>Shabaz, Mohammad</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0000-0001-5106-7609</orcidid><orcidid>https://orcid.org/0000-0001-8679-0258</orcidid><orcidid>https://orcid.org/0000-0002-3322-1315</orcidid></search><sort><creationdate>20220312</creationdate><title>A Secure Two-Factor Authentication Framework in Cloud Computing</title><author>kaur, Sandeep ; kaur, Gaganpreet ; Shabaz, Mohammad</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-2b93a4815a0109d8c90b4ab7f83b3307e20d35f9b0b9ac49f7bf0a529b020c763</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Authentication</topic><topic>Cloud computing</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Information technology</topic><topic>Privacy</topic><topic>Security management</topic><topic>Software-as-a-service</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>kaur, Sandeep</creatorcontrib><creatorcontrib>kaur, Gaganpreet</creatorcontrib><creatorcontrib>Shabaz, Mohammad</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>kaur, Sandeep</au><au>kaur, Gaganpreet</au><au>Shabaz, Mohammad</au><au>Nazir, Shah</au><au>Shah Nazir</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Secure Two-Factor Authentication Framework in Cloud Computing</atitle><jtitle>Security and communication networks</jtitle><date>2022-03-12</date><risdate>2022</risdate><volume>2022</volume><spage>1</spage><epage>9</epage><pages>1-9</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>Cloud computing technology has brought tremendous evaluation in the arena of IT (information technology). This technology paves the path of starting business with lowest investment by availing infrastructure as a service (IAAS), platform as a service (PAAS) and software as a service (SAAS) pay per uses model. Cloud computing services can be quickly and easily provisioned and discharged with minimum efforts and service provider (SP) relationship. Cloud computing characteristics such as on demand self-service, broad network access, resource pooling, and rapid elasticity lead the demand of computing. Despite these features, this platform is free to security issues and attacks specifically in terms of communication because of unsecure authentication and privacy. However, strong user authentication procedure impedes illegal access to the SP which is the principal requirement for securing cloud computing ecosystem. In this regard, we attempt to propose possible counter measures for the cloud ecosystem. Hence, this paper presented a novel one way hash and nonce-based two-factor secure authentication scheme with traditional user IDs, password, and OTP verification procedure that resist brute force attack, session and account hijacking attack, MITM attacks, and replay attacks.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2022/7540891</doi><tpages>9</tpages><orcidid>https://orcid.org/0000-0001-5106-7609</orcidid><orcidid>https://orcid.org/0000-0001-8679-0258</orcidid><orcidid>https://orcid.org/0000-0002-3322-1315</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2022-03, Vol.2022, p.1-9 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_journals_2640851295 |
source | Wiley Online Library Open Access; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection |
subjects | Authentication Cloud computing Cryptography Data encryption Information technology Privacy Security management Software-as-a-service |
title | A Secure Two-Factor Authentication Framework in Cloud Computing |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T13%3A17%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Secure%20Two-Factor%20Authentication%20Framework%20in%20Cloud%20Computing&rft.jtitle=Security%20and%20communication%20networks&rft.au=kaur,%20Sandeep&rft.date=2022-03-12&rft.volume=2022&rft.spage=1&rft.epage=9&rft.pages=1-9&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2022/7540891&rft_dat=%3Cproquest_cross%3E2640851295%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2640851295&rft_id=info:pmid/&rfr_iscdi=true |