2015 IEEE International Advance Computing Conference (IACC) 2015
DOI: 10.1109/iadcc.2015.7154897
|View full text |Cite
|
Sign up to set email alerts
|

A proof of concept implementation of a mobile based authentication scheme without password table for cloud environment

Abstract: Cloud computing is a fast growing technology offering a wide range of software and infrastructure services on a pay-per-use basis. Many small and medium businesses (SMB's) have adopted this utility based Computing Model as it contributes to reduced operational and capital expenditure. Though the resource sharing feature adopted by Cloud service providers (CSP's) enables the organizations to invest less on infrastructure, it also raises concerns about the security of data stored at CSP's premises. The fact that… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…In ref. [24], the authors proposed an authentication mechanism using an encrypted password and mobile phone token stored within a mobile phone as the authentication factors. In this mechanism, the registration and the management of the user identity information processes are undertaken by an identity provider (IdP).…”
Section: Cryptographic Based Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In ref. [24], the authors proposed an authentication mechanism using an encrypted password and mobile phone token stored within a mobile phone as the authentication factors. In this mechanism, the registration and the management of the user identity information processes are undertaken by an identity provider (IdP).…”
Section: Cryptographic Based Methodsmentioning
confidence: 99%
“…Several authentication approaches have been considered for authenticating users across many different computing platforms, including MCC. Some approaches considered the cryptographic based methods [24,25], where the authentication process is based on exchanging security keys or by using session tickets with trusted third-party entities. Other approaches focus on biometric authentication [26,27], which recognizes the user through physiological or behavioral characteristics unique to the user such as voice recognition, iris scanning, or finger prints.…”
Section: An Overview Of MCC Authentication Protocolsmentioning
confidence: 99%
“…A two factor authentication scheme using an encrypted password and mobile phone token stored on the mobile device was introduced in 2015 [13]. In this scheme, an identity provider (IdP) undertook the tasks of registering, storing and managing the user identity information and issuing the user with a token to access the services of the Cloud Service Provider (CSP).…”
Section: Two Factor Authentication Methodsmentioning
confidence: 99%
“…If the device is stolen, user information can be extracted from the device 4. No mechanism employed to protect against attacks Password & phone token [13] 1. Provides mutual authentication 2.…”
Section: Techniquementioning
confidence: 99%