Skip to main content

A Multi-factor Authentication Scheme to Strength Data-Storage Access

  • Conference paper
  • First Online:
Big Data, Cloud and Applications (BDCA 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 872))

Included in the following conference series:

Abstract

Nowadays Cloud Computing is one of the most useful IT technology in the world, many companies and individuals, adopt this technology due to its benefits, such as high performance infrastructure, scalability, cost efficiency etc.

However Security remains one of the biggest problems that make this technology less trustful. With the big success of the Cloud, many Hackers started focusing on it, and many attacks that use to be exclusively targeting the web, are now used against Cloud system especially the SaaS.

That’s why authentication to the SaaS and data storage systems is now a serious issue, in order to protect our system and client information. This paper describes a scheme that strength the authentication system of data storage, using multi-factor authentication such as OTP, smart card and try to bring an alternative system that manage authentication Error issues.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Pandey, S., Farik, M.: Cloud computing security: latest issues & countermeasures. Int. J. Sci. Technol. Res. 4(11), 2–30 (2015)

    Google Scholar 

  2. Ma, J.: 14 December 2015 https://www.incapsula.com/blog/top-10-cloud-security-concerns.html. Accessed 9 Sept 2017

  3. Luo, Q., Fei, Y.: Algorithmic collision analysis for evaluating cryptographic system and side-channel attacks. In: International Symposium on H/w – Oriented Security and Trust (2011)

    Google Scholar 

  4. Duncan, A., Creese, S., Goldsmith, M.: Insider attacks in cloud computing. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communication, pp. 857–862 (2012)

    Google Scholar 

  5. Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.L.: On technical security issues in cloud computing. In: 2009 IEEE International Conference on Cloud Computing (2009)

    Google Scholar 

  6. Vani Mounika, S., Preetiparwekar: Survey on cloud data storage security techniques. In: National Conference on Advanced Functional Materials and Computer Applications in Materials Technology (CAMCAT-2014), pp. 95–98 (2014)

    Google Scholar 

  7. Simon Leech 2016: Cloud Security Threats - Insecure APIs. https://community.hpe.com/t5/Grounded-in-the-Cloud/Cloud-Security-Threats-Insecure-APIs/ba-p/6871684#.Wbw0b_PyjIV. Accessed 9 Sept 2017

  8. Shackleford, D.: Cloud API security risks: how to assess cloud service provider APIs. http://searchcloudsecurity.techtarget.com/tip/Cloud-API-security-risks-How-to-assess-cloud-service-provider-APIs. Accessed 9 Sept 2017

  9. Rodero-Merino, L., et al.: Building safe PasS clouds: a survey on security in the multitenant software platforms. Comput. Secur. 31(1), 96–108 (2012)

    Article  Google Scholar 

  10. Banyal, R.K., Jain, P., Jain, V.K.: Multi-factor authentication framework for cloud computing. In: 2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation (2013)

    Google Scholar 

  11. Chakraborty, S., Singh, S.K., Chakraborty, P.: Local quadruple pattern: a novel descriptor for facial image recognition and retrieval Comput. Electr. Eng. 62, 1–13 (2017)

    Google Scholar 

  12. Saunders, S.: Cyber Security Firm Uses a 3D Printed Mask to Fool iPhone X’s Facial Recognition Software, 13 November 2017. https://3dprint.com/194079/3d-printed-mask-iphone-x-face-id/

  13. Roshabin, N., Miller, J.: ADAMAS: interweaving unicode and color to enhance CAPTCHA security. Future Gener. Comput. Syst. 55, 289–310 (2014)

    Article  Google Scholar 

  14. Kluever, K.A.: Evaluating the usability and security of a video CAPTCHA. Master’s thesis, Rochester Institute of Technology, Rochester, New York, August 2008

    Google Scholar 

  15. Rao, K., Sri, K., Sai, G.: A novel video CAPTCHA technique to prevent BOT attacks. In: International Conference on Computational Modeling and Security (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Soufiane Sail .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sail, S., Bouden, H. (2018). A Multi-factor Authentication Scheme to Strength Data-Storage Access. In: Tabii, Y., Lazaar, M., Al Achhab, M., Enneya, N. (eds) Big Data, Cloud and Applications. BDCA 2018. Communications in Computer and Information Science, vol 872. Springer, Cham. https://doi.org/10.1007/978-3-319-96292-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-96292-4_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-96291-7

  • Online ISBN: 978-3-319-96292-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics