Skip to main content

Multi Factor Authentication as a Service (MFAaaS) for Federated Cloud Environments

  • Conference paper
  • First Online:
Proceedings of the Second International Conference on Innovations in Computing Research (ICR’23)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 721))

  • 476 Accesses

Abstract

Growing needs of organizations have left them looking for innovative solutions in cloud computing. One of the methods currently being used to meet those demands is federated cloud computing. Described as the linking of many service providers' cloud environments to load balance traffic and respond to spikes in server demand, this environment provides great solutions for those in need of them. However, cloud computing generally uses single factor authentication which has proven to be less effective. This paper proposes a multi factor authentication framework for federated cloud environments to address the security issues surrounding federated cloud computing. The proposed method will be implemented on a simulated cloud environment to evaluate its strength and ability of protection against various simulated attacks and all results will be recorded.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Dollarhide, M.: Social Media. Investopedia.Com (2021, December 7). https://www.investopedia.com/terms/s/social-media.asp

  2. Surmelioglu, Y., Seferoglu, S.S.: An examination of digital footprint awareness and digital experiences of higher education students. World J. Educ. Technol.: Curr. Issues 11, 48–64 (2019). https://doi.org/10.18844/jet.v11i1.4009

  3. Huang, S.-Y., Ban, T.: Monitoring social media for vulnerability-threat prediction and topic analysis. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2020)

    Google Scholar 

  4. Gurunath, R., Klaib, M.F.J., Samanta, D., Khan, M.Z.: Social media and steganography: use, risks and current status. IEEE Access 9, 153656–153665 (2021)

    Article  Google Scholar 

  5. Alotaibi, S., Alharbi, K., Alwabli, H. Aljoaey, H., Abaalkhail, B., Khediri, S.E.: Threats, crimes and issues of privacy of users’ information shared on online social networks. In: 2021 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1-8 (2021). https://doi.org/10.1109/ISNCC52172.2021.9615815

  6. (N.d.-b). Researchgate.Net. Retrieved December 10, 2021. https://www.researchgate.net/profile/Subhi-Zeebaree/publication/348930053_Social_Media_Networks_Security_Threats_Risks_and_Recommendation_A_Case_Study_in_the_Kurdistan_Region/links/6017c23545851517ef2eb05b/Social-Media-Networks-Security-Threats-Risks-and-Recommendation-A-Case-Study-in-the-Kurdistan-Region.pdf

  7. Ghazinour, K., Ponchak, J.: Hidden privacy risks in sharing pictures on social media. Procedia Comput. Sci. 113, 267–272 (2017)

    Article  Google Scholar 

  8. Ali, S., Islam, N., Rauf, A., Din, I., Guizani, M., Rodrigues, J.: Privacy and security issues in online social networks. Future Internet 10(12), 114 (2018)

    Article  Google Scholar 

  9. Social media as a tool for malware propagation, cybercrime, and data loss, Techgenix.com, 24-Jul-2020. https://techgenix.com/social-media-malware/. Accessed: 09 Dec 2021

  10. Vinayakumar, M., Alazab, A., Jolfaei, S., Poornachandran, P.: Ransomware triage using deep learning: twitter as a case study. In: 2019 Cybersecurity and Cyberforensics Conference (CCC) (2019)

    Google Scholar 

  11. Chaudhary, P., Gupta, B.B., Gupta, S.: Cross-site scripting (XSS) worms in Online Social Network (OSN): taxonomy and defensive mechanisms. In: 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 2131–2136 (2016)

    Google Scholar 

  12. Khan, Z.R., Rakhman, S., Bangera, A.: Who stole me? Identity theft on social media in the UAE. GATR J. Manage. Market. Rev. 2(1), 79–86 (2017). https://doi.org/10.35609/jmmr.2017.2.1(11)

    Article  Google Scholar 

  13. Kaubiyal, J., Jain, A.K.: A feature based approach to detect fake profiles in twitter. In: Proceedings of the 3rd International Conference on Big Data and Internet of Things - BDIOT 2019 (2019)

    Google Scholar 

  14. Why social media awareness training in the workplace is a good idea, Associationofmbas.com, 02-Jul-2019. https://www.associationofmbas.com/why-social-media-awareness-training-in-the-workplace-is-a-good-idea/. Accessed 09 Dec 2021

  15. Greenman, C.: Top seven reasons why you should not share your passwords - SolarWinds, Logicalread.com, 12-Jul-2017. https://logicalread.com/top-seven-reasons-why-you-should-not-share-your-passwords/. Accessed 09 Dec 2021

  16. 5 reasons why general software updates and patches are important, Norton.com. https://us.norton.com/internetsecurity-how-to-the-importance-of-general-software-updates-and-patches.html. Accessed 09 Dec 2021

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rabia Latif .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

AlAnsary, S.A., Latif, R., Saba, T. (2023). Multi Factor Authentication as a Service (MFAaaS) for Federated Cloud Environments. In: Daimi, K., Al Sadoon, A. (eds) Proceedings of the Second International Conference on Innovations in Computing Research (ICR’23). Lecture Notes in Networks and Systems, vol 721. Springer, Cham. https://doi.org/10.1007/978-3-031-35308-6_19

Download citation

Publish with us

Policies and ethics