Abstract
Technology is upgrading day by day, today a common man cannot survive without internet. Most of the services offered over the internet and so managing personal credentials are very difficult for the common people. Most of the organizations using cloud computing platform not only using for their IT environment and related offered services but also for consumer services. It means that soon all the IT-enabled services will be offered via cloud computing platform. There are issues in cloud computing security out of it authentication and access control is one of the key issues. The current research is to find out the best alternatives or provide the solution for authentication and access control. In this research paper, a survey approach is used to study various authentication methods widely used in the industry.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
P. Selvigrija, D. Sumithra, Security as a challenge in cloud computing: a survey. Int. J. Comput. Appl. 6(3) (2013)
A. Kudale, Dr. B. Kumar, Review -a study on authentication and access control for cloud computing. Int. J. Res. Comput. Sci. Manage. (2014). (Research Scholar, Karpagam Academy of Higher Education)
A. Dmitrienko, C. Liebchen, C. Rossow, A. Sadeghl, Security analysis of mobile two-factor authentication schemes. Intel@ Technol. J. 18(4) (2014)
S.Y. Lim, M.M. Kiah, T.F. Ang, Security issues and future challenges of cloud service authentication. Acta Polytechnica Hungarica 14(2) (2017)
A. Kudale, Dr. B. Kumar, Protected authentication by login credential and OTP for cloud based application. Int. J. Comp. Appl. 5(3), 2250–1797 (2015). (Research Scholar, Karpagam Academy of Higher Education)
T. Rao, K. Vedavathi, Authentication using mobile phone as a security token. IJCSET 1(9), 569–574 (2011)
A. Kudale, Dr. S. Hema Latha, Futuristic authentication in cloud computing environments. KARPAGAM J. Comput. Sci. 12(1), 0976–2926 (2017). (Research Scholar, Karpagam Academy of Higher Education)
J. Sun, Z. Gao, Improved mobile application security mechanism based on Kerberos. In: 4th International Workshop on Materials Engineering and Computer Sciences (IWMECS 2019) (2019)
C.H. Jhansi Rani, S.K. Shammi Munnisa, A survey on web authentication methods for web applications. Int. J. Comput. Sci. Inf. Technol. 7(4), 1678–1680 (2016)
https://www.fi.muni.cz/usr/matyas/cms_matyas_riha_biometrics.pdf. Accessed in 2019
https://www.csoonline.com/article/3330695/6-reasons-biometrics-are-bad-authenticators-and-1-acceptable-use.html. Accessed 2019
D. Dinesh Kumar, K. Vijay, S. Bhavani, E. Malathy, R. Mahadevan, A study on different types of authentication techniques in data security. Int. J. Civil Eng. Technol. (IJCIET) 8(12), 194–201 (2017)
A. Kudale, Dr. S. Hemalatha, Mobile-app-based authentication framework for cloud computing. Int. J. Adv. Sci. Technol. 29(7), 1541–1548 (2020)
G. Kumaresan, N. Veeraragavan, Dr. L. Arockiam, A study of user authentication techniques in cloud computing. JETIR 2(8) (2015)
V. Shankar, K. Singh, Survey on mobile authentication schemes. In: 3rd International Conference on Internet of Things and Connected Technology (ICIoTCT) (2018)
https://medium.com/@vivekmadurai/different-ways-to-authenticate-a-web-application-e8f3875c254a. Accessed 2019
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kudale, A., Hemalatha, S. (2021). Cloud Computing: An Analysis of Authentication Methods Over Internet. In: Kaiser, M.S., Xie, J., Rathore, V.S. (eds) Information and Communication Technology for Competitive Strategies (ICTCS 2020). Lecture Notes in Networks and Systems, vol 190. Springer, Singapore. https://doi.org/10.1007/978-981-16-0882-7_68
Download citation
DOI: https://doi.org/10.1007/978-981-16-0882-7_68
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-0881-0
Online ISBN: 978-981-16-0882-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)