Skip to main content

Two-Factor Authentication Scheme Using One Time Password in Cloud Computing

  • Conference paper
  • First Online:
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2018 (AISI 2018)

Abstract

Cloud computing is widely used by many users, so any one must be authenticated before accessing any service into the cloud. In this paper, a two-factor authentication scheme is proposed to authenticate users in cloud computing. The first factor uses the traditional user name and password, while the second factor uses one time password, which is valid for only one login session or transaction. During the registration phase, user must choose a user name and a password in addition to specify 4 cells from a 3 × 3 grid to use its containing characters when logging into the system. At the login phase, the user inputs his user name and password then, a grid with random numbers is displayed to him, and he must input the sequence of characters chosen during the registration phase. These characters represent the one time password which is changed every login. The results show that the proposed scheme can resist practical attacks, easy for users, does not have strong constrains, and does not require specific extra hardware.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hashizume, K., Rosado, D.G., Medina, E.F., Femandez, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4(1), 1 (2013)

    Article  Google Scholar 

  2. Yan, X., Zhang, X., Chen, T., Zhao, H., Li, X.: The research and design of cloud computing security framework. In: Wu, Y. (eds.) Advances in Computer, Communication, Control and Automation. Lecture Notes in Electrical Engineering (LNEE), vol. 121. Springer, Heidelberg (2011)

    Google Scholar 

  3. Eminagaoglu, M., Cini, E., Sert, G., Zor, D.: A two-factor authentication system with QR codes for web and mobile application. In: 5th International Conference on Emerging Security Technologies, Turkey, 10–12 September, pp. 105–112. IEEE (2014)

    Google Scholar 

  4. Sun, H., Chen, S., Yeh, J., Cheng, C.: A shoulder surfing resistant graphical authentication system. J. Trans. Dependable Secure Comput. 99, 1 (2016)

    Google Scholar 

  5. Devki, P., Rao, R.: A novel way of ICON based authentication methods. In: Proceedings of International Advance Computing Conference (IACC), India, 12–13 June, pp. 449–453. IEEE (2015)

    Google Scholar 

  6. Laghari, A., Rehman, W.U., Memon, Z.A.: Biometric authentication technique using smartphone sensor. In: 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST), Islamabad, Pakistan, 12–16 January, pp. 381–384. IEEE (2016)

    Google Scholar 

  7. Cotta, L., Fernandes, A.L., Melo, L.T.C., Saggioro, L.F.Z., Martins, F., Neto, A.L.M., Loureiro, A.A.F., Cunha, I., Oliveira, L.B.: User authentication for smart devices based on nomadic keys. In: International Conference on Communication (ICC), Communication and Information Systems Security Symposium, Kuala Lumpur, Malaysia, 22–27 May, pp. 1–6. IEEE (2016)

    Google Scholar 

  8. Kim, T., Yi, J.H., Seo, C.: Spyware resistant smartphone user authentication scheme. Int. J. Distrib. Sensor Netw. 2014, 1–8 (2014)

    Google Scholar 

  9. Kumari, S., Om, H.: Remote login authentication scheme based on bilinear and fingerprint. J. Trans. Internet Inf. Syst. KSII 9(12), 4987–5014 (2015)

    Google Scholar 

  10. Kang, D., Jung, J., Mun, J., Lee, D., Choi, Y., Won, D.: Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain. J. Secur. Commun. Netw. 9(11), 1462–1476 (2016)

    Article  Google Scholar 

  11. Reddy, A.G., Yoon, E., Das, A.K., Yoo, K.: Light weight authentication with key-agreement protocol for mobile network environment using smart cards. IET Inf. Secur. 10(5), 272–282 (2016)

    Article  Google Scholar 

  12. Leu, J., Hsieh, W.: Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards. IET Inf. Secur. 8(2), 104–113 (2014)

    Article  Google Scholar 

  13. Jeong, Y., Park, J.S., Park, J.H.: An efficient authentication system of smart device using multi factors in mobile cloud service architecture. Int. J. Commun. Syst. 28(4), 659–674 (2015)

    Article  Google Scholar 

  14. Amin, R., Hafizul, S., Biswas, G.P., Giri, D., Khan, M.K., Kumar, N.: A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments. J. Secur. Commun. Netw. 9(17), 4650–4666 (2016)

    Article  Google Scholar 

  15. Paranjape, V., Pandey, V.: An approach towards security in private cloud using OTP. Int. J. Emerg. Technol. Adv. Eng. 3(3), 683–687 (2013)

    Google Scholar 

  16. Acharya, S., Polawar, A., Pawar, P.Y.: Two factor authentication using smartphone generated one time password. IOSR J. Comput. Eng. (IOSR-JCE) 11(2), 85–90 (2013)

    Article  Google Scholar 

  17. Mohamed, E.M., Abdelkader, H.S., El-Etriby, S.: Data security model for cloud computing. In: 12th International Conference on Networks (ICN), pp. 66–74, Seville, Spain, 27 January–1 February 2013 (2013)

    Google Scholar 

  18. Yeh, H., Chen, B., Wu, Y.: Mobile user authentication system in cloud environment. J. Secur. Commun. Netw. 6(9), 1161–1168 (2013)

    Article  Google Scholar 

  19. Marimuthu, K., Gopal, D.G., Kanth, K.S., Setty, S., Tainwala, K.: Scalable and secure data sharing for dynamic groups in cloud. In: International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), Ramanathapuram, India, 8–10 May, pp. 1697–1701. IEEE (2014)

    Google Scholar 

  20. Raza, M., Iqbal, M., Sharif, M., Haider, W.: A survey of password attacks and comparative analysis on methods for secure authentication. World Appl. Sci. J. 19(4), 439–444 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Samar H. El-sherif .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

El-sherif, S.H., Abdel-kader, R.F., Rizk, R.Y. (2019). Two-Factor Authentication Scheme Using One Time Password in Cloud Computing. In: Hassanien, A., Tolba, M., Shaalan, K., Azar, A. (eds) Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2018. AISI 2018. Advances in Intelligent Systems and Computing, vol 845. Springer, Cham. https://doi.org/10.1007/978-3-319-99010-1_39

Download citation

Publish with us

Policies and ethics