Skip to main content

Analysis of Authentication Techniques Adopted by End Users in Real-Life Cloud Implementation

  • 1281 Accesses

Part of the Advances in Intelligent Systems and Computing book series (AISC,volume 409)

Abstract

Security and privacy concerns when using cloud computing services are similar to those of the traditional noncloud services. Cloud Computing represents dynamic area during present days with new security level and trust. In this paper, we have analyzed the authentication techniques adopted by the users. There are various cloud computing issues like security, privacy, trust etc. which should be solved quickly to increase the user trust in cloud-based services. There are so many techniques to secure data in cloud like user id and password, pattern lock system, biometric system, one-time password (OTP) via email or SMS etc. Through this paper, we have tried to analyze how multifactor authentication techniques are adopted by end users. The result obtained after the analysis related to authentication techniques adopted and preferred by the users are given using various visual summaries.

Keywords

  • Authentication
  • Cloud computing issues
  • SaaS
  • PaaS
  • IaaS
  • Authentication techniques
  • Multifactor authentication
  • One-time password (OTP)
  • Two-factor authentication

Authors’ contributions

The two authors contributed equally to this work.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-981-10-0135-2_9
  • Chapter length: 9 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   269.00
Price excludes VAT (USA)
  • ISBN: 978-981-10-0135-2
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   349.99
Price excludes VAT (USA)
Fig. 1
Fig. 2
Fig. 3
Fig. 4

References

  1. Retrieved March 23, 2015, from http://serverfault.com/questions/57077/what-is-the-difference-between-authentication-and-authorization.

  2. Retrieved March 25, 2015, from http://www.nist.gov/itl/cloud/.

  3. Vikas, K., Swetha, M. S., Muneshwara, M. S., & Prakash, S. (2012). Cloud computing: Towards case study of data security mechanism. In International Journal of Advanced Technology & Engineering. Research (IJATER), 2(4), 1–8.

    Google Scholar 

  4. Retrieved April 3, 2015, from http://searchsecurity.techtarget.com/tip/ID-and-password-authentication-Keeping-data-safe-with-management-and-policies.

  5. Retrieved November 30, 2014, from http://en.wikipedia.org/wiki/Multi-factor_authentication.

  6. Retrieved December 10, 2014, from http://www.secureauth.com/blog/cloud-storage-2-factor-authentication-review/.

  7. Rupal, R., & Sreeja, N. (2014). A novel graphical password approach for accessing cloud and data verification. International Journal of Research in Engineering and Technology, 3(05), 734–738.

    CrossRef  Google Scholar 

  8. Retrieved April 6, 2015, from http://en.wikipedia.org/wiki/QR_code.

  9. Retrieved April 6, 2015, from http://www.robabdul.com/marketing/qr-code-advantages-and-disadvantages/.

  10. Bansi, K., & Kuntal, P. (January–June 2015). A novel model for security and data access for jointly accessing the cloud service. BIJIT—BVICAM’s International Journal of Information Technology, 7(1), 841–844.

    Google Scholar 

Download references

Acknowledgments

We would like to thank Mr. Raghu Khimani, Cyber Crime Expert/Advisor for his valuable support during the execution of this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bansi Khimani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Khimani, B., Patel, K. (2016). Analysis of Authentication Techniques Adopted by End Users in Real-Life Cloud Implementation. In: Satapathy, S., Joshi, A., Modi, N., Pathak, N. (eds) Proceedings of International Conference on ICT for Sustainable Development. Advances in Intelligent Systems and Computing, vol 409. Springer, Singapore. https://doi.org/10.1007/978-981-10-0135-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0135-2_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0133-8

  • Online ISBN: 978-981-10-0135-2

  • eBook Packages: EngineeringEngineering (R0)