Skip to main content

Authentication in Cloud Computing Environment Using Two Factor Authentication

  • Conference paper
  • First Online:
Proceedings of the Third International Conference on Soft Computing for Problem Solving

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 259))

Abstract

The security is one of the indispensable concerns in the cloud computing. Different authentication and access mechanisms are implemented for different services in the cloud. For uniform strong authentication and obviate the need for password registration, two factor authentication (T-FA) has been proposed. The data owner provides one of the credentials in this is a two tier mechanism. T-FA needs two identities based on what the user knows and what he possesses which is implemented through Software as a Service (SaaS) in the cloud computing environment. However, key-compromise impersonation makes the software only mechanism vulnerable if a server is compromised. This study examines this vulnerability and proposes an identity based signature technique to make T-FA resilient to impersonation attack. Analysis shows that the proposed technique is able to make T-FA mechanism robust to key-compromise impersonation attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Takabi, H., Joshi James, B.D., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Soc. pp. 24–31 (2010)

    Google Scholar 

  2. Choudhury, A.J., Kumar, P., Sain, M., Lim, H., Hoon, JL.: A strong user authentication framework for cloud computing. IEEE Asia-Pacific Services Computing Conference, pp. 110–115 (2011)

    Google Scholar 

  3. Robert, L.G.: The case of cloud computing. IT Prof. 11(2), 23–27 (2009)

    Article  Google Scholar 

  4. Ramgovind, S., Eloff, M.M., Smith, E.: The management of security in cloud computing. IEEE Info. Secur. South Africa, pp. 1–7 (2010)

    Google Scholar 

  5. Kim, W.: Cloud computing today and tomorrow. J. Object Technol 8(1), 65–72 (2009)

    Article  Google Scholar 

  6. Rash, W.: Is cloud computing secure? Prove it, In tech in depth, eWeek, pp. 8–10 (2009)

    Google Scholar 

  7. FIPS.: Digital Signature Standard. Federal Information Processing Standards Publication 186, 186–2 (1994)

    Google Scholar 

  8. Taekyoung, K.: Impersonation attacks on software-only two-factor authentication schemes. IEEE Commun. Lett. 6(8), 358–360 (2002)

    Article  Google Scholar 

  9. Cao, Xuefei, Zeng, Xingwen, Kou, Weidong, Hu, Liangbing: Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Trans. Veh. Technol. 58(7), 3508–3517 (2009)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Brijesh Kumar Chaurasia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Chaurasia, B.K., Shahi, A., Verma, S. (2014). Authentication in Cloud Computing Environment Using Two Factor Authentication. In: Pant, M., Deep, K., Nagar, A., Bansal, J. (eds) Proceedings of the Third International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 259. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1768-8_67

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1768-8_67

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1767-1

  • Online ISBN: 978-81-322-1768-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics