2015
DOI: 10.19026/rjaset.9.1451
|View full text |Cite
|
Sign up to set email alerts
|

Authentication Methods in Cloud Computing: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 58 publications
0
2
0
Order By: Relevance
“…Although biometric systems provide the highest level of security, they mostly have usability issues such as being slow and sometimes unreliable as human physiology may change due to old age or ill health. Other problems with biometric systems include ‗spoof attacks' [16] and ‗template database leakage' [17]. They also mostly require the attachment of additional components to traditional computing systems and handheld devices, which are often very expensive.…”
Section: A Overview Of Existing Authentication Methodsmentioning
confidence: 99%
“…Although biometric systems provide the highest level of security, they mostly have usability issues such as being slow and sometimes unreliable as human physiology may change due to old age or ill health. Other problems with biometric systems include ‗spoof attacks' [16] and ‗template database leakage' [17]. They also mostly require the attachment of additional components to traditional computing systems and handheld devices, which are often very expensive.…”
Section: A Overview Of Existing Authentication Methodsmentioning
confidence: 99%
“…The word "Biometric" is an ancient Greek word which referees to bio means "life" and metric means "measure" (Babaeizadeh et al, 2015). Biometric authentication supports three important factors of information security system.…”
Section: Biometrics System Operationmentioning
confidence: 99%
“…It prevents illegal access and strengthens the privacy of end user and its contents. Research community proposes various authentication mechanism and protocols for cloud environment such as password based user authentication [2], Research community proposes various authentication mechanism and protocols for cloud environment such as password based user authentication [2], Challenge-response authentication protocols [3], Biometric-based authentication [4], Token-based authentication [5][6], Multi Factor Authentication (MFA) [7], Single sign-on authentication [8], etc. The progress and challenges of these existing techniques have been discussed in our research article [9].…”
Section: Introductionmentioning
confidence: 99%