Abstract
Nowadays Cloud Computing is one of the most useful IT technology in the world, many companies and individuals, adopt this technology due to its benefits, such as high performance infrastructure, scalability, cost efficiency etc.
However Security remains one of the biggest problems that make this technology less trustful. With the big success of the Cloud, many Hackers started focusing on it, and many attacks that use to be exclusively targeting the web, are now used against Cloud system especially the SaaS.
That’s why authentication to the SaaS and data storage systems is now a serious issue, in order to protect our system and client information. This paper describes a scheme that strength the authentication system of data storage, using multi-factor authentication such as OTP, smart card and try to bring an alternative system that manage authentication Error issues.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Pandey, S., Farik, M.: Cloud computing security: latest issues & countermeasures. Int. J. Sci. Technol. Res. 4(11), 2–30 (2015)
Ma, J.: 14 December 2015 https://www.incapsula.com/blog/top-10-cloud-security-concerns.html. Accessed 9 Sept 2017
Luo, Q., Fei, Y.: Algorithmic collision analysis for evaluating cryptographic system and side-channel attacks. In: International Symposium on H/w – Oriented Security and Trust (2011)
Duncan, A., Creese, S., Goldsmith, M.: Insider attacks in cloud computing. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communication, pp. 857–862 (2012)
Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.L.: On technical security issues in cloud computing. In: 2009 IEEE International Conference on Cloud Computing (2009)
Vani Mounika, S., Preetiparwekar: Survey on cloud data storage security techniques. In: National Conference on Advanced Functional Materials and Computer Applications in Materials Technology (CAMCAT-2014), pp. 95–98 (2014)
Simon Leech 2016: Cloud Security Threats - Insecure APIs. https://community.hpe.com/t5/Grounded-in-the-Cloud/Cloud-Security-Threats-Insecure-APIs/ba-p/6871684#.Wbw0b_PyjIV. Accessed 9 Sept 2017
Shackleford, D.: Cloud API security risks: how to assess cloud service provider APIs. http://searchcloudsecurity.techtarget.com/tip/Cloud-API-security-risks-How-to-assess-cloud-service-provider-APIs. Accessed 9 Sept 2017
Rodero-Merino, L., et al.: Building safe PasS clouds: a survey on security in the multitenant software platforms. Comput. Secur. 31(1), 96–108 (2012)
Banyal, R.K., Jain, P., Jain, V.K.: Multi-factor authentication framework for cloud computing. In: 2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation (2013)
Chakraborty, S., Singh, S.K., Chakraborty, P.: Local quadruple pattern: a novel descriptor for facial image recognition and retrieval Comput. Electr. Eng. 62, 1–13 (2017)
Saunders, S.: Cyber Security Firm Uses a 3D Printed Mask to Fool iPhone X’s Facial Recognition Software, 13 November 2017. https://3dprint.com/194079/3d-printed-mask-iphone-x-face-id/
Roshabin, N., Miller, J.: ADAMAS: interweaving unicode and color to enhance CAPTCHA security. Future Gener. Comput. Syst. 55, 289–310 (2014)
Kluever, K.A.: Evaluating the usability and security of a video CAPTCHA. Master’s thesis, Rochester Institute of Technology, Rochester, New York, August 2008
Rao, K., Sri, K., Sai, G.: A novel video CAPTCHA technique to prevent BOT attacks. In: International Conference on Computational Modeling and Security (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Sail, S., Bouden, H. (2018). A Multi-factor Authentication Scheme to Strength Data-Storage Access. In: Tabii, Y., Lazaar, M., Al Achhab, M., Enneya, N. (eds) Big Data, Cloud and Applications. BDCA 2018. Communications in Computer and Information Science, vol 872. Springer, Cham. https://doi.org/10.1007/978-3-319-96292-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-96292-4_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-96291-7
Online ISBN: 978-3-319-96292-4
eBook Packages: Computer ScienceComputer Science (R0)