Abstract
Growing needs of organizations have left them looking for innovative solutions in cloud computing. One of the methods currently being used to meet those demands is federated cloud computing. Described as the linking of many service providers' cloud environments to load balance traffic and respond to spikes in server demand, this environment provides great solutions for those in need of them. However, cloud computing generally uses single factor authentication which has proven to be less effective. This paper proposes a multi factor authentication framework for federated cloud environments to address the security issues surrounding federated cloud computing. The proposed method will be implemented on a simulated cloud environment to evaluate its strength and ability of protection against various simulated attacks and all results will be recorded.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Dollarhide, M.: Social Media. Investopedia.Com (2021, December 7). https://www.investopedia.com/terms/s/social-media.asp
Surmelioglu, Y., Seferoglu, S.S.: An examination of digital footprint awareness and digital experiences of higher education students. World J. Educ. Technol.: Curr. Issues 11, 48–64 (2019). https://doi.org/10.18844/jet.v11i1.4009
Huang, S.-Y., Ban, T.: Monitoring social media for vulnerability-threat prediction and topic analysis. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2020)
Gurunath, R., Klaib, M.F.J., Samanta, D., Khan, M.Z.: Social media and steganography: use, risks and current status. IEEE Access 9, 153656–153665 (2021)
Alotaibi, S., Alharbi, K., Alwabli, H. Aljoaey, H., Abaalkhail, B., Khediri, S.E.: Threats, crimes and issues of privacy of users’ information shared on online social networks. In: 2021 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1-8 (2021). https://doi.org/10.1109/ISNCC52172.2021.9615815
(N.d.-b). Researchgate.Net. Retrieved December 10, 2021. https://www.researchgate.net/profile/Subhi-Zeebaree/publication/348930053_Social_Media_Networks_Security_Threats_Risks_and_Recommendation_A_Case_Study_in_the_Kurdistan_Region/links/6017c23545851517ef2eb05b/Social-Media-Networks-Security-Threats-Risks-and-Recommendation-A-Case-Study-in-the-Kurdistan-Region.pdf
Ghazinour, K., Ponchak, J.: Hidden privacy risks in sharing pictures on social media. Procedia Comput. Sci. 113, 267–272 (2017)
Ali, S., Islam, N., Rauf, A., Din, I., Guizani, M., Rodrigues, J.: Privacy and security issues in online social networks. Future Internet 10(12), 114 (2018)
Social media as a tool for malware propagation, cybercrime, and data loss, Techgenix.com, 24-Jul-2020. https://techgenix.com/social-media-malware/. Accessed: 09 Dec 2021
Vinayakumar, M., Alazab, A., Jolfaei, S., Poornachandran, P.: Ransomware triage using deep learning: twitter as a case study. In: 2019 Cybersecurity and Cyberforensics Conference (CCC) (2019)
Chaudhary, P., Gupta, B.B., Gupta, S.: Cross-site scripting (XSS) worms in Online Social Network (OSN): taxonomy and defensive mechanisms. In: 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 2131–2136 (2016)
Khan, Z.R., Rakhman, S., Bangera, A.: Who stole me? Identity theft on social media in the UAE. GATR J. Manage. Market. Rev. 2(1), 79–86 (2017). https://doi.org/10.35609/jmmr.2017.2.1(11)
Kaubiyal, J., Jain, A.K.: A feature based approach to detect fake profiles in twitter. In: Proceedings of the 3rd International Conference on Big Data and Internet of Things - BDIOT 2019 (2019)
Why social media awareness training in the workplace is a good idea, Associationofmbas.com, 02-Jul-2019. https://www.associationofmbas.com/why-social-media-awareness-training-in-the-workplace-is-a-good-idea/. Accessed 09 Dec 2021
Greenman, C.: Top seven reasons why you should not share your passwords - SolarWinds, Logicalread.com, 12-Jul-2017. https://logicalread.com/top-seven-reasons-why-you-should-not-share-your-passwords/. Accessed 09 Dec 2021
5 reasons why general software updates and patches are important, Norton.com. https://us.norton.com/internetsecurity-how-to-the-importance-of-general-software-updates-and-patches.html. Accessed 09 Dec 2021
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
AlAnsary, S.A., Latif, R., Saba, T. (2023). Multi Factor Authentication as a Service (MFAaaS) for Federated Cloud Environments. In: Daimi, K., Al Sadoon, A. (eds) Proceedings of the Second International Conference on Innovations in Computing Research (ICR’23). Lecture Notes in Networks and Systems, vol 721. Springer, Cham. https://doi.org/10.1007/978-3-031-35308-6_19
Download citation
DOI: https://doi.org/10.1007/978-3-031-35308-6_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-35307-9
Online ISBN: 978-3-031-35308-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)