Skip to content
2000
Volume 18, Issue 8
  • ISSN: 2352-0965
  • E-ISSN: 2352-0973

Abstract

Aims and Background

Accessing data services on the cloud raises serious concerns about security and privacy. To verify a client's stated identity, the existing authentication approach uses just one authentication factor. However, traditional techniques of one-factor authentication are inefficient since they demand an excessive amount of user information and expose their private data to eavesdropping.

Methods

Cloud-based data storage is susceptible to both external and internal threats. Information security relies heavily on authentication, which is a method for verifying user identities before granting them access to protected data. When it comes to protecting data in a cloud computing environment from the most cutting-edge methods of attack, traditional password authentication simply isn't enough. For the purpose of protecting user identities in the cloud, this study presents interactive multi-layer authentication systems. Various access control policies are used when validating users in the cloud. Registration, permissions, and authentication factors for users are all parts of the cloud app's security process.

Results

An intrusion detection system is built into the security mechanism to help identify people who could be malevolent. Various techniques are available for user identity verification, including intrusion detection, access control, and multi-factor authentication. The last step is to encrypt the data so that no one else can read it.

Conclusion

To guarantee the effectiveness and accuracy of the suggested frameworks and methodology, they are experimentally evaluated. There were few false positives and a high detection rate.

Loading

Article metrics loading...

/content/journals/raeeng/10.2174/0123520965291181240702072701
2024-07-18
2025-11-15
Loading full text...

Full text loading...

References

  1. PrabakaranD. RamachandranS. Multi-factor authentication for secured financial transactions in cloud environment.CMC-Computers.Comput. Mater. Continua20227011781179810.32604/cmc.2022.019591
    [Google Scholar]
  2. Peñuelas-AnguloA. Feregrino-UribeC. CumplidoR. An adaptive method for prevention of overflow in reversible data hiding schemes.Expert Syst. Appl.202323012061010.1016/j.eswa.2023.120610
    [Google Scholar]
  3. SaidW. MostafaE. HassanM.M. MostafaA.M. A multi-factor authentication-based framework for identity management in cloud applications.Comput. Mater. Continua2022713193320910.32604/cmc.2022.023554
    [Google Scholar]
  4. SasikumarM. JayarinP.J. VinnarasiF.S.F. A hierarchical optimized resource utilization based content placement (HORCP) model for cloud Content delivery networks (CDNs).J. Cloud Comput.202312113910.1186/s13677‑023‑00519‑2
    [Google Scholar]
  5. ReddyP.C. NachiyappanS. RamakrishnaV. SenthilR. Sajid AnwerM.D. Hybrid model using scrum methodology for softwar development system.J Nucl Ene Sci. Power Generat Techno.20211092
    [Google Scholar]
  6. SaqibR.M. KhanA.S. JavedY. AhmadS. NisarK. AbbasiI.A. HaqueM.R. JulaihiA.A. Analysis and intellectual structure of the multi-factor authentication in information security.Intel. Auto. Soft Comp.20223231510.32604/iasc.2022.021786
    [Google Scholar]
  7. FareedM. YassinA.A. Privacy-preserving multi-factor authentication and role-based access control scheme for the E-healthcare system.Bull. Elect. Engin. Inform.20221142131214110.11591/eei.v11i4.3658
    [Google Scholar]
  8. NagarajuS. ParthibanL. Analyzing configurations of authentication access points in cloud using attack graph.2015 IEEE International Conference on Computer Graphics, Vision and Information Security (CGVIS), 2015 02-03 November 2015, Bhubaneswar, India, pp.72-76.10.1109/CGVIS.2015.7449896
    [Google Scholar]
  9. SucharithaY. ReddyP.C.S. SuryanarayanaG. Network Intrusion Detection of Drones Using Recurrent Neural Networks.Drone Technology: Future Trends and Practical Applications. John Wiley and Sons2023
    [Google Scholar]
  10. ReddyP.C.S. PradeepaM. VenkatakiranS. WaliaR. SaravananM. Image and signal processing in the underwater environment.J Nucl Ene Sci Power Generat Techno20211092
    [Google Scholar]
  11. OttaS.P. PandaS. GuptaM. HotaC. A systematic survey of multi-factor authentication for cloud infrastructure.Future Internet202315414610.3390/fi15040146
    [Google Scholar]
  12. MohammedB.A. Al-ShareedaM.A. ManickamS. Al-MekhlafiZ.G. AlreshidiA. AlazmiM. AlshudukhiJ.S. AlsaffarM. FC-PA: fog computing-based pseudonym authentication scheme in 5G-enabled vehicular networks.IEEE Access202311185711858110.1109/ACCESS.2023.3247222
    [Google Scholar]
  13. Al-MekhlafiZ.G. Al-ShareedaM.A. ManickamS. MohammedB.A. AlreshidiA. AlazmiM. AlshudukhiJ.S. AlsaffarM. AlsewariA. Chebyshev polynomial-based fog computing scheme supporting pseudonym revocation for 5G-enabled vehicular networks.Electronics202312487210.3390/electronics12040872
    [Google Scholar]
  14. AhmadM.O. TripathiG. SiddiquiF. AlamM.A. AhadM.A. AkhtarM.M. CasalinoG. BAuth-ZKP—A blockchain-based multi-factor authentication mechanism for securing smart cities.Sensors2023235275710.3390/s2305275736904955
    [Google Scholar]
  15. KhanA.R. AlnwihelL.K. A Brief review on cloud computing authentication frameworks.Appl. Sci. Res.2023131999710004
    [Google Scholar]
  16. SucharithaY. Shaker ReddyP.C. An autonomous adaptive enhancement method based on learning to optimize heterogeneous network selection.Int. J. Sensors Wirel. Commun. Control202212749550910.2174/2210327912666221012154428
    [Google Scholar]
  17. ZeroualA. AmrouneM. DerdourM. BentaharA. Lightweight deep learning model to secure authentication in Mobile Cloud Computing.J. King Saud Uni. Comp. Inform. Sci.20223496938694810.1016/j.jksuci.2021.09.016
    [Google Scholar]
  18. Mohana PrabhaK. Vidhya SaraswathiP. Suppressed K-Anonymity Multi-Factor Authentication Based Schmidt-Samoa Cryptography for privacy preserved data access in cloud computing.Comput. Commun.2020158859410.1016/j.comcom.2020.04.057
    [Google Scholar]
  19. PrajapatiP. ShahP. A review on secure data deduplication: Cloud storage security issue.J. King Saud Uni. Comp. Inform. Sci.20223473996400710.1016/j.jksuci.2020.10.021
    [Google Scholar]
  20. Shaker ReddyP.C. SucharithaY. IoT-enabled energy-efficient multipath power control for underwater sensor networks.Int. J. Sensors Wirel. Commun. Control202212647849410.2174/2210327912666220615103257
    [Google Scholar]
  21. MuthappaK.A. NishaA.S.A. ShastriR. AvasthiV. ReddyP.C.S. Design of high-speed, low-power non-volatile master slave flip flop (NVMSFF) for memory registers designs.Appl. Nanosci.20231385369537810.1007/s13204‑023‑02814‑5
    [Google Scholar]
  22. KaiserT. SiddiquaR. HasanM.M.U. A multi-layer security system for data access control, authentication, and authorizationThesis and Report, BSc (Computer Science and Engineering), Brac University, 2022.
    [Google Scholar]
  23. ChatterjeeA. PrinzA. Applying spring security framework with keycloak-based oauth2 to protect microservice architecture apis: A case study.Sensors2022225170310.3390/s2205170335270850
    [Google Scholar]
  24. KebandeV.R. AwayshehF.M. IkuesanR.A. AlawadiS.A. AlshehriM.D. A blockchain-based multi-factor authentication model for a cloud-enabled internet of vehicles.Sensors20212118601810.3390/s2118601834577224
    [Google Scholar]
  25. DasguptaD. RoyA. NagA. DasguptaD. RoyA. NagA. Multi-Factor Authentication: More secure approach towards authenticating individuals.Advances in User AuthenticationSpringer2017, pp. 185-233.10.1007/978‑3‑319‑58808‑7_5
    [Google Scholar]
  26. JainS. DoriyaR. Security framework to healthcare robots for secure sharing of healthcare data from cloud.Int. J. Inf. Technol.20221452429243910.1007/s41870‑022‑00997‑835633945
    [Google Scholar]
  27. SivabalanN. MuruganB.S. Lightweight two-factor authentication with s-box flipping module for IoT security.Int. J. e-Collab.2022181124
    [Google Scholar]
  28. LedwaniD. SainiH. LedwaniL. BhagirathS.N. BhatnagarV. Review on security issues and solutions in cloud computing.J. Discrete Math. Sci. Crypto.20222572149215810.1080/09720529.2022.2133253
    [Google Scholar]
  29. SabithaR. ShuklaA.P. MehbodniyaA. ShakkeeraL. ReddyP.C.S. A fuzzy trust evaluation of cloud collaboration outlier detection in wireless sensor networks.Ad Hoc Sens. Wirel. Netw.2022202253
    [Google Scholar]
  30. ChoY. OhJ. KwonD. SonS. YuS. ParkY. ParkY. A secure three-factor authentication protocol for e-governance system based on multiserver environments.IEEE Access202210743517436510.1109/ACCESS.2022.3191419
    [Google Scholar]
  31. Al-ShareedaM.A. ManickamS. COVID-19 vehicle based on an efficient mutual authentication scheme for 5G-enabled vehicular fog computing.Int. J. Environ. Res. Public Health202219231561810.3390/ijerph19231561836497709
    [Google Scholar]
  32. Al-MekhlafiZ.G. Al-ShareedaM.A. ManickamS. MohammedB.A. QtaishA. Lattice-based lightweight quantum resistant scheme in 5G-enabled vehicular networks.Mathematics202311239910.3390/math11020399
    [Google Scholar]
  33. NigamD. PatelS.N. Raj VincentP.M.D. SrinivasanK. ArunmozhiS. Biometric authentication for intelligent and privacy-preserving healthcare systems.J. Healthc. Eng.2022202211510.1155/2022/178999635368929
    [Google Scholar]
  34. JoshiA. AkramS.V. Multifactor Authentication Scheme for Privacy Preserved Data Security.2022 International Conference on Futuristic Technologies (INCOFT), 2022 25-27 November 2022, Belgaum, India, pp. 1-8.10.1109/INCOFT55651.2022.10094403
    [Google Scholar]
  35. AhamadD. Alam HameedS. AkhtarM. A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization.J. King Saud Uni. Comp. Inform. Sci.20223462343235810.1016/j.jksuci.2020.10.015
    [Google Scholar]
/content/journals/raeeng/10.2174/0123520965291181240702072701
Loading
/content/journals/raeeng/10.2174/0123520965291181240702072701
Loading

Data & Media loading...


  • Article Type:
    Research Article
Keyword(s): cloud computing; intrusion; Multi-factor authentication; privacy; security; trustee
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test