Reference Hub10
Multi Factor Two-way Hash-Based Authentication in Cloud Computing

Multi Factor Two-way Hash-Based Authentication in Cloud Computing

K. DeviPriya, Sumalatha Lingamgunta
Copyright: © 2020 |Volume: 10 |Issue: 2 |Pages: 21
ISSN: 2156-1834|EISSN: 2156-1826|EISBN13: 9781799807742|DOI: 10.4018/IJCAC.2020040104
Cite Article Cite Article

MLA

K. DeviPriya, and Sumalatha Lingamgunta. "Multi Factor Two-way Hash-Based Authentication in Cloud Computing." IJCAC vol.10, no.2 2020: pp.56-76. http://doi.org/10.4018/IJCAC.2020040104

APA

K. DeviPriya & Lingamgunta, S. (2020). Multi Factor Two-way Hash-Based Authentication in Cloud Computing. International Journal of Cloud Applications and Computing (IJCAC), 10(2), 56-76. http://doi.org/10.4018/IJCAC.2020040104

Chicago

K. DeviPriya, and Sumalatha Lingamgunta. "Multi Factor Two-way Hash-Based Authentication in Cloud Computing," International Journal of Cloud Applications and Computing (IJCAC) 10, no.2: 56-76. http://doi.org/10.4018/IJCAC.2020040104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The expansion of Cloud computing is influencing various domains such as education, the banking sector, industries, government, health informatics, and individuals. The characteristics of an easy interface, on-demand access, scalability, and low infrastructure investment have to lead to the fast adaptation of Cloud computing based upon their needs. Despite the advantages, Cloud computing is open to more security risks and attacks especially in terms of communication due to the lack of secure authentication and privacy. In this article is presented a novel hash-based multifactor secure mutual authentication scheme that includes mathematical hashing properties, certificates, nonce values, traditional user ids, and password mechanisms that resist MITM attacks, replay attacks, and forgery attacks. We implemented our proposed method in the Microsoft Azure cloud and the results are evaluated. The security analysis is done by using the Scyther tool and with a formal analysis by using GNY belief logic. The results indicate the proposed scheme is capable of providing strong secure authentication.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.