A Secure Two-Factor Authentication Framework in Cloud Computing

Cloud computing technology has brought tremendous evaluation in the arena of IT (information technology). This technology paves the path of starting business with lowest investment by availing infrastructure as a service (IAAS), platform as a service (PAAS) and software as a service (SAAS) pay per u...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2022-03, Vol.2022, p.1-9
Hauptverfasser: kaur, Sandeep, kaur, Gaganpreet, Shabaz, Mohammad
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 9
container_issue
container_start_page 1
container_title Security and communication networks
container_volume 2022
creator kaur, Sandeep
kaur, Gaganpreet
Shabaz, Mohammad
description Cloud computing technology has brought tremendous evaluation in the arena of IT (information technology). This technology paves the path of starting business with lowest investment by availing infrastructure as a service (IAAS), platform as a service (PAAS) and software as a service (SAAS) pay per uses model. Cloud computing services can be quickly and easily provisioned and discharged with minimum efforts and service provider (SP) relationship. Cloud computing characteristics such as on demand self-service, broad network access, resource pooling, and rapid elasticity lead the demand of computing. Despite these features, this platform is free to security issues and attacks specifically in terms of communication because of unsecure authentication and privacy. However, strong user authentication procedure impedes illegal access to the SP which is the principal requirement for securing cloud computing ecosystem. In this regard, we attempt to propose possible counter measures for the cloud ecosystem. Hence, this paper presented a novel one way hash and nonce-based two-factor secure authentication scheme with traditional user IDs, password, and OTP verification procedure that resist brute force attack, session and account hijacking attack, MITM attacks, and replay attacks.
doi_str_mv 10.1155/2022/7540891
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2640851295</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2640851295</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-2b93a4815a0109d8c90b4ab7f83b3307e20d35f9b0b9ac49f7bf0a529b020c763</originalsourceid><addsrcrecordid>eNp9kE1LAzEQhoMoWD9u_oCAR107-Wo2JymLVaHgwXoOSTZrU9tNzWYp_nu3tHj0NMPwMC_vg9ANgQdChBhToHQsBYdSkRM0IoqpAgilp3874efooutWABPCJR-hxyl-965PHi92sZgZl2PC0z4vfZuDMznEFs-S2fhdTF84tLhax77GVdxs-xzazyt01ph156-P8xJ9zJ4W1Usxf3t-rabzwjEmc0GtYoaXRBggoOrSKbDcWNmUzDIG0lOomWiUBauM46qRtgEj6HCg4OSEXaLbw99tit-977JexT61Q6Smk6GwIFSJgbo_UC7Frku-0dsUNib9aAJ6r0jvFemjogG_O-DL0NZmF_6nfwG_-GPw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2640851295</pqid></control><display><type>article</type><title>A Secure Two-Factor Authentication Framework in Cloud Computing</title><source>Wiley Online Library Open Access</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>kaur, Sandeep ; kaur, Gaganpreet ; Shabaz, Mohammad</creator><contributor>Nazir, Shah ; Shah Nazir</contributor><creatorcontrib>kaur, Sandeep ; kaur, Gaganpreet ; Shabaz, Mohammad ; Nazir, Shah ; Shah Nazir</creatorcontrib><description>Cloud computing technology has brought tremendous evaluation in the arena of IT (information technology). This technology paves the path of starting business with lowest investment by availing infrastructure as a service (IAAS), platform as a service (PAAS) and software as a service (SAAS) pay per uses model. Cloud computing services can be quickly and easily provisioned and discharged with minimum efforts and service provider (SP) relationship. Cloud computing characteristics such as on demand self-service, broad network access, resource pooling, and rapid elasticity lead the demand of computing. Despite these features, this platform is free to security issues and attacks specifically in terms of communication because of unsecure authentication and privacy. However, strong user authentication procedure impedes illegal access to the SP which is the principal requirement for securing cloud computing ecosystem. In this regard, we attempt to propose possible counter measures for the cloud ecosystem. Hence, this paper presented a novel one way hash and nonce-based two-factor secure authentication scheme with traditional user IDs, password, and OTP verification procedure that resist brute force attack, session and account hijacking attack, MITM attacks, and replay attacks.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2022/7540891</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Authentication ; Cloud computing ; Cryptography ; Data encryption ; Information technology ; Privacy ; Security management ; Software-as-a-service</subject><ispartof>Security and communication networks, 2022-03, Vol.2022, p.1-9</ispartof><rights>Copyright © 2022 Sandeep kaur et al.</rights><rights>Copyright © 2022 Sandeep kaur et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-2b93a4815a0109d8c90b4ab7f83b3307e20d35f9b0b9ac49f7bf0a529b020c763</citedby><cites>FETCH-LOGICAL-c337t-2b93a4815a0109d8c90b4ab7f83b3307e20d35f9b0b9ac49f7bf0a529b020c763</cites><orcidid>0000-0001-5106-7609 ; 0000-0001-8679-0258 ; 0000-0002-3322-1315</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27903,27904</link.rule.ids></links><search><contributor>Nazir, Shah</contributor><contributor>Shah Nazir</contributor><creatorcontrib>kaur, Sandeep</creatorcontrib><creatorcontrib>kaur, Gaganpreet</creatorcontrib><creatorcontrib>Shabaz, Mohammad</creatorcontrib><title>A Secure Two-Factor Authentication Framework in Cloud Computing</title><title>Security and communication networks</title><description>Cloud computing technology has brought tremendous evaluation in the arena of IT (information technology). This technology paves the path of starting business with lowest investment by availing infrastructure as a service (IAAS), platform as a service (PAAS) and software as a service (SAAS) pay per uses model. Cloud computing services can be quickly and easily provisioned and discharged with minimum efforts and service provider (SP) relationship. Cloud computing characteristics such as on demand self-service, broad network access, resource pooling, and rapid elasticity lead the demand of computing. Despite these features, this platform is free to security issues and attacks specifically in terms of communication because of unsecure authentication and privacy. However, strong user authentication procedure impedes illegal access to the SP which is the principal requirement for securing cloud computing ecosystem. In this regard, we attempt to propose possible counter measures for the cloud ecosystem. Hence, this paper presented a novel one way hash and nonce-based two-factor secure authentication scheme with traditional user IDs, password, and OTP verification procedure that resist brute force attack, session and account hijacking attack, MITM attacks, and replay attacks.</description><subject>Authentication</subject><subject>Cloud computing</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Information technology</subject><subject>Privacy</subject><subject>Security management</subject><subject>Software-as-a-service</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kE1LAzEQhoMoWD9u_oCAR107-Wo2JymLVaHgwXoOSTZrU9tNzWYp_nu3tHj0NMPwMC_vg9ANgQdChBhToHQsBYdSkRM0IoqpAgilp3874efooutWABPCJR-hxyl-965PHi92sZgZl2PC0z4vfZuDMznEFs-S2fhdTF84tLhax77GVdxs-xzazyt01ph156-P8xJ9zJ4W1Usxf3t-rabzwjEmc0GtYoaXRBggoOrSKbDcWNmUzDIG0lOomWiUBauM46qRtgEj6HCg4OSEXaLbw99tit-977JexT61Q6Smk6GwIFSJgbo_UC7Frku-0dsUNib9aAJ6r0jvFemjogG_O-DL0NZmF_6nfwG_-GPw</recordid><startdate>20220312</startdate><enddate>20220312</enddate><creator>kaur, Sandeep</creator><creator>kaur, Gaganpreet</creator><creator>Shabaz, Mohammad</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0000-0001-5106-7609</orcidid><orcidid>https://orcid.org/0000-0001-8679-0258</orcidid><orcidid>https://orcid.org/0000-0002-3322-1315</orcidid></search><sort><creationdate>20220312</creationdate><title>A Secure Two-Factor Authentication Framework in Cloud Computing</title><author>kaur, Sandeep ; kaur, Gaganpreet ; Shabaz, Mohammad</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-2b93a4815a0109d8c90b4ab7f83b3307e20d35f9b0b9ac49f7bf0a529b020c763</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Authentication</topic><topic>Cloud computing</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Information technology</topic><topic>Privacy</topic><topic>Security management</topic><topic>Software-as-a-service</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>kaur, Sandeep</creatorcontrib><creatorcontrib>kaur, Gaganpreet</creatorcontrib><creatorcontrib>Shabaz, Mohammad</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>kaur, Sandeep</au><au>kaur, Gaganpreet</au><au>Shabaz, Mohammad</au><au>Nazir, Shah</au><au>Shah Nazir</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Secure Two-Factor Authentication Framework in Cloud Computing</atitle><jtitle>Security and communication networks</jtitle><date>2022-03-12</date><risdate>2022</risdate><volume>2022</volume><spage>1</spage><epage>9</epage><pages>1-9</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>Cloud computing technology has brought tremendous evaluation in the arena of IT (information technology). This technology paves the path of starting business with lowest investment by availing infrastructure as a service (IAAS), platform as a service (PAAS) and software as a service (SAAS) pay per uses model. Cloud computing services can be quickly and easily provisioned and discharged with minimum efforts and service provider (SP) relationship. Cloud computing characteristics such as on demand self-service, broad network access, resource pooling, and rapid elasticity lead the demand of computing. Despite these features, this platform is free to security issues and attacks specifically in terms of communication because of unsecure authentication and privacy. However, strong user authentication procedure impedes illegal access to the SP which is the principal requirement for securing cloud computing ecosystem. In this regard, we attempt to propose possible counter measures for the cloud ecosystem. Hence, this paper presented a novel one way hash and nonce-based two-factor secure authentication scheme with traditional user IDs, password, and OTP verification procedure that resist brute force attack, session and account hijacking attack, MITM attacks, and replay attacks.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2022/7540891</doi><tpages>9</tpages><orcidid>https://orcid.org/0000-0001-5106-7609</orcidid><orcidid>https://orcid.org/0000-0001-8679-0258</orcidid><orcidid>https://orcid.org/0000-0002-3322-1315</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2022-03, Vol.2022, p.1-9
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_journals_2640851295
source Wiley Online Library Open Access; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection
subjects Authentication
Cloud computing
Cryptography
Data encryption
Information technology
Privacy
Security management
Software-as-a-service
title A Secure Two-Factor Authentication Framework in Cloud Computing
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T13%3A17%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Secure%20Two-Factor%20Authentication%20Framework%20in%20Cloud%20Computing&rft.jtitle=Security%20and%20communication%20networks&rft.au=kaur,%20Sandeep&rft.date=2022-03-12&rft.volume=2022&rft.spage=1&rft.epage=9&rft.pages=1-9&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2022/7540891&rft_dat=%3Cproquest_cross%3E2640851295%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2640851295&rft_id=info:pmid/&rfr_iscdi=true