Skip to main content

Cloud Computing: An Analysis of Authentication Methods Over Internet

  • Conference paper
  • First Online:
Information and Communication Technology for Competitive Strategies (ICTCS 2020)

Abstract

Technology is upgrading day by day, today a common man cannot survive without internet. Most of the services offered over the internet and so managing personal credentials are very difficult for the common people. Most of the organizations using cloud computing platform not only using for their IT environment and related offered services but also for consumer services. It means that soon all the IT-enabled services will be offered via cloud computing platform. There are issues in cloud computing security out of it authentication and access control is one of the key issues. The current research is to find out the best alternatives or provide the solution for authentication and access control. In this research paper, a survey approach is used to study various authentication methods widely used in the industry.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. P. Selvigrija, D. Sumithra, Security as a challenge in cloud computing: a survey. Int. J. Comput. Appl. 6(3) (2013)

    Google Scholar 

  2. A. Kudale, Dr. B. Kumar, Review -a study on authentication and access control for cloud computing. Int. J. Res. Comput. Sci. Manage. (2014). (Research Scholar, Karpagam Academy of Higher Education)

    Google Scholar 

  3. A. Dmitrienko, C. Liebchen, C. Rossow, A. Sadeghl, Security analysis of mobile two-factor authentication schemes. Intel@ Technol. J. 18(4) (2014)

    Google Scholar 

  4. S.Y. Lim, M.M. Kiah, T.F. Ang, Security issues and future challenges of cloud service authentication. Acta Polytechnica Hungarica 14(2) (2017)

    Google Scholar 

  5. A. Kudale, Dr. B. Kumar, Protected authentication by login credential and OTP for cloud based application. Int. J. Comp. Appl. 5(3), 2250–1797 (2015). (Research Scholar, Karpagam Academy of Higher Education)

    Google Scholar 

  6. T. Rao, K. Vedavathi, Authentication using mobile phone as a security token. IJCSET 1(9), 569–574 (2011)

    Google Scholar 

  7. A. Kudale, Dr. S. Hema Latha, Futuristic authentication in cloud computing environments. KARPAGAM J. Comput. Sci. 12(1), 0976–2926 (2017). (Research Scholar, Karpagam Academy of Higher Education)

    Google Scholar 

  8. J. Sun, Z. Gao, Improved mobile application security mechanism based on Kerberos. In: 4th International Workshop on Materials Engineering and Computer Sciences (IWMECS 2019) (2019)

    Google Scholar 

  9. C.H. Jhansi Rani, S.K. Shammi Munnisa, A survey on web authentication methods for web applications. Int. J. Comput. Sci. Inf. Technol. 7(4), 1678–1680 (2016)

    Google Scholar 

  10. https://www.fi.muni.cz/usr/matyas/cms_matyas_riha_biometrics.pdf. Accessed in 2019

  11. https://www.csoonline.com/article/3330695/6-reasons-biometrics-are-bad-authenticators-and-1-acceptable-use.html. Accessed 2019

  12. D. Dinesh Kumar, K. Vijay, S. Bhavani, E. Malathy, R. Mahadevan, A study on different types of authentication techniques in data security. Int. J. Civil Eng. Technol. (IJCIET) 8(12), 194–201 (2017)

    Google Scholar 

  13. A. Kudale, Dr. S. Hemalatha, Mobile-app-based authentication framework for cloud computing. Int. J. Adv. Sci. Technol. 29(7), 1541–1548 (2020)

    Google Scholar 

  14. G. Kumaresan, N. Veeraragavan, Dr. L. Arockiam, A study of user authentication techniques in cloud computing. JETIR 2(8) (2015)

    Google Scholar 

  15. V. Shankar, K. Singh, Survey on mobile authentication schemes. In: 3rd International Conference on Internet of Things and Connected Technology (ICIoTCT) (2018)

    Google Scholar 

  16. https://medium.com/@vivekmadurai/different-ways-to-authenticate-a-web-application-e8f3875c254a. Accessed 2019

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kudale, A., Hemalatha, S. (2021). Cloud Computing: An Analysis of Authentication Methods Over Internet. In: Kaiser, M.S., Xie, J., Rathore, V.S. (eds) Information and Communication Technology for Competitive Strategies (ICTCS 2020). Lecture Notes in Networks and Systems, vol 190. Springer, Singapore. https://doi.org/10.1007/978-981-16-0882-7_68

Download citation

Publish with us

Policies and ethics