Reference Hub6
Access Control Framework Using Multi-Factor Authentication in Cloud Computing

Access Control Framework Using Multi-Factor Authentication in Cloud Computing

Subhash Chandra Patel, Sumit Jaiswal, Ravi Shankar Singh, Jyoti Chauhan
Copyright: © 2018 |Volume: 9 |Issue: 2 |Pages: 15
ISSN: 1948-5018|EISSN: 1948-5026|EISBN13: 9781522545552|DOI: 10.4018/IJGC.2018070101
Cite Article Cite Article

MLA

Patel, Subhash Chandra, et al. "Access Control Framework Using Multi-Factor Authentication in Cloud Computing." IJGC vol.9, no.2 2018: pp.1-15. http://doi.org/10.4018/IJGC.2018070101

APA

Patel, S. C., Jaiswal, S., Singh, R. S., & Chauhan, J. (2018). Access Control Framework Using Multi-Factor Authentication in Cloud Computing. International Journal of Green Computing (IJGC), 9(2), 1-15. http://doi.org/10.4018/IJGC.2018070101

Chicago

Patel, Subhash Chandra, et al. "Access Control Framework Using Multi-Factor Authentication in Cloud Computing," International Journal of Green Computing (IJGC) 9, no.2: 1-15. http://doi.org/10.4018/IJGC.2018070101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The most challenging issues in cloud computing are access control and data security because users of the cloud outsource sensitive data and information to cloud provider servers, which are not within the same trusted domain as the data owner. Within cloud computing, various services and resources need protection from unauthorized use as a part of the security. Authentication is a key technology for information security. In recent years, a lot of research has been carried out throughout the world and several schemes have been proposed to improve authentication in the cloud. Remote authentication is the commonly used method to determine the identity of the remote client. In this article, the authors have proposed a systematic method for authenticating clients, namely by using a password, biometrics, and out-of-band-based access control mechanisms that are suitable for access control. The proposed system involves user ID/password, biometrics characteristics, and a mobile phone as a software token for one-time password generation.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.