2017
DOI: 10.12700/aph.14.2.2017.2.4
|View full text |Cite
|
Sign up to set email alerts
|

Security Issues and Future Challenges of Cloud Service Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…The amount of math utilized in the suggested protocols was cut down with the use of hashing, geo-location services, and random number generators. Table 1defines the notation used for the proposed protocols to measure the computational expense [27][28][29][30][31][32][33][34][35][36].…”
Section: Fig3 Proposed Firebase Database 5experimental Results and Di...mentioning
confidence: 99%
See 1 more Smart Citation
“…The amount of math utilized in the suggested protocols was cut down with the use of hashing, geo-location services, and random number generators. Table 1defines the notation used for the proposed protocols to measure the computational expense [27][28][29][30][31][32][33][34][35][36].…”
Section: Fig3 Proposed Firebase Database 5experimental Results and Di...mentioning
confidence: 99%
“…Depending on the developer's point of view, which has been produced using the tool developed with Firebase by many elements. The client and developer can retain their harmonious relationship by delaying work as little as possible [29,30].…”
Section: Related Workmentioning
confidence: 99%
“…Identity verification in the Cloud-based Metaverse involves establishing the authenticity of users and ensuring their claimed identities (Lim et al, 2017). This process safeguards against unauthorized access, impersonation, and fraudulent activities within virtual environments.…”
Section: Identification and Authentication Methodsmentioning
confidence: 99%
“…Waleed et al proposed a DDoS detection scheme based on RNN for SIP-based networks with satisfactory results [ 54 ]. Typical SIP authentication is weak due to reliance on basic methods like digest access authentication, lack of multi-factor authentication, and vulnerability to attacks like brute force and spoofing [ 55 , 56 ]. These shortcomings blur the lines between attackers and legitimate users, increasing DDoS threats.…”
Section: Related Workmentioning
confidence: 99%