Access Control Framework Using Multi-Factor Authentication in Cloud Computing

Access Control Framework Using Multi-Factor Authentication in Cloud Computing

Subhash Chandra Patel, Sumit Jaiswal, Ravi Shankar Singh, Jyoti Chauhan
DOI: 10.4018/978-1-7998-5339-8.ch053
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The most challenging issues in cloud computing are access control and data security because users of the cloud outsource sensitive data and information to cloud provider servers, which are not within the same trusted domain as the data owner. Within cloud computing, various services and resources need protection from unauthorized use as a part of the security. Authentication is a key technology for information security. In recent years, a lot of research has been carried out throughout the world and several schemes have been proposed to improve authentication in the cloud. Remote authentication is the commonly used method to determine the identity of the remote client. In this article, the authors have proposed a systematic method for authenticating clients, namely by using a password, biometrics, and out-of-band-based access control mechanisms that are suitable for access control. The proposed system involves user ID/password, biometrics characteristics, and a mobile phone as a software token for one-time password generation.
Chapter Preview
Top

3. Risks Associated To Cloud Computing

The hazard is the opportunity of an occasion and a negative impact on the success of attempts. Cloud technologies and solutions for non-cloud technologies agonize from the same type of risk, that is, security, integrity, availability and performance, Horwath et al. (2012). The level of organizational risk depends solutions are used in which way in the cloud. It is because of up and down in the probability and influence on events of the threat (inside and outside) linked through CSP which were contracted for services Babu et al. (2013). Few specific risks related with cloud computing are the following.

3.1. Lack of Transparency

The cloud does not contain statistics about its procedures, processes, controls and events for users. For example, cloud clients have little knowledge of data storage locations, procedures used by CSP to provide or assign computing possessions, precise panels used to guard mechanisms of the cloud design, or how the client data is parted by a cloud, M.S Babu et al. (2013).

3.2. Data Leakage

When tenants are more vulnerable to information leaks access numerous cloud with compromised that he was not given, and dedicated servers simply means the organization The risk is a basketball data and information linked to the privacy and confidentiality of war, Patel et al. (2015).

3.3. Cloud Service Provider Feasibility

Cloud facility suppliers might eventually go through a partnership in the initial phase. For instance an outcome, CSP users might face functioning disturbances or suffer the time and cost for examination also accepting another resolution, for example adapting back to in house held resolutions, Patel et al. (2015).

Complete Chapter List

Search this Book:
Reset