Abstract
The security is one of the indispensable concerns in the cloud computing. Different authentication and access mechanisms are implemented for different services in the cloud. For uniform strong authentication and obviate the need for password registration, two factor authentication (T-FA) has been proposed. The data owner provides one of the credentials in this is a two tier mechanism. T-FA needs two identities based on what the user knows and what he possesses which is implemented through Software as a Service (SaaS) in the cloud computing environment. However, key-compromise impersonation makes the software only mechanism vulnerable if a server is compromised. This study examines this vulnerability and proposes an identity based signature technique to make T-FA resilient to impersonation attack. Analysis shows that the proposed technique is able to make T-FA mechanism robust to key-compromise impersonation attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Takabi, H., Joshi James, B.D., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Soc. pp. 24–31 (2010)
Choudhury, A.J., Kumar, P., Sain, M., Lim, H., Hoon, JL.: A strong user authentication framework for cloud computing. IEEE Asia-Pacific Services Computing Conference, pp. 110–115 (2011)
Robert, L.G.: The case of cloud computing. IT Prof. 11(2), 23–27 (2009)
Ramgovind, S., Eloff, M.M., Smith, E.: The management of security in cloud computing. IEEE Info. Secur. South Africa, pp. 1–7 (2010)
Kim, W.: Cloud computing today and tomorrow. J. Object Technol 8(1), 65–72 (2009)
Rash, W.: Is cloud computing secure? Prove it, In tech in depth, eWeek, pp. 8–10 (2009)
FIPS.: Digital Signature Standard. Federal Information Processing Standards Publication 186, 186–2 (1994)
Taekyoung, K.: Impersonation attacks on software-only two-factor authentication schemes. IEEE Commun. Lett. 6(8), 358–360 (2002)
Cao, Xuefei, Zeng, Xingwen, Kou, Weidong, Hu, Liangbing: Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Trans. Veh. Technol. 58(7), 3508–3517 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Chaurasia, B.K., Shahi, A., Verma, S. (2014). Authentication in Cloud Computing Environment Using Two Factor Authentication. In: Pant, M., Deep, K., Nagar, A., Bansal, J. (eds) Proceedings of the Third International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 259. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1768-8_67
Download citation
DOI: https://doi.org/10.1007/978-81-322-1768-8_67
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1767-1
Online ISBN: 978-81-322-1768-8
eBook Packages: EngineeringEngineering (R0)