A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure

The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest numerous approaches to enhance cloud authenticati...

Full description

Bibliographic Details
Main Authors: Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta, Chittaranjan Hota
Format: Article
Language:English
Published: MDPI AG 2023-04-01
Series:Future Internet
Subjects:
Online Access:https://www.mdpi.com/1999-5903/15/4/146
_version_ 1797605406102519808
author Soumya Prakash Otta
Subhrakanta Panda
Maanak Gupta
Chittaranjan Hota
author_facet Soumya Prakash Otta
Subhrakanta Panda
Maanak Gupta
Chittaranjan Hota
author_sort Soumya Prakash Otta
collection DOAJ
description The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest numerous approaches to enhance cloud authentication towards robustness. User names and associated passwords have been a common practice for long as Single Factor Authentication. However, advancements in the speed of computing and the usage of simple methods, starting from the Brute Force technique to the implementation of advanced and efficient crytographic algorithms, have posed several threats and vulnerabilities for authentication systems, leading to the degradation of their effectiveness. Multi-factor authentication has emerged as a robust means of securing the cloud using simultaneous and multiple means of authentication factors. This employs multiple levels of cascaded authentication checks. This paper covers an extensive and systematic survey of various factors towards their adoption and suitability for authentication for multi-factor authentication mechanisms. The inference drawn from the survey is in terms of arriving at a unique authentication factor that does not require any additional, specialized hardware or software for multi-factor authentication. Such authentication also uses the distinct biometric characteristics of the concerned user in the process. This arrangement augments the secured and robust user authentication process. The mechanism is also assessed as an effective means against impersonation attacks.
first_indexed 2024-03-11T05:00:39Z
format Article
id doaj.art-f0497ab8aeba411da7fa2da2778b52ce
institution Directory Open Access Journal
issn 1999-5903
language English
last_indexed 2024-03-11T05:00:39Z
publishDate 2023-04-01
publisher MDPI AG
record_format Article
series Future Internet
spelling doaj.art-f0497ab8aeba411da7fa2da2778b52ce2023-11-17T19:20:18ZengMDPI AGFuture Internet1999-59032023-04-0115414610.3390/fi15040146A Systematic Survey of Multi-Factor Authentication for Cloud InfrastructureSoumya Prakash Otta0Subhrakanta Panda1Maanak Gupta2Chittaranjan Hota3Department of Computer Science and Information Systems, Birla Institute of Technology and Science-Pilani, Hyderabad Campus, Secunderabad 500078, IndiaDepartment of Computer Science and Information Systems, Birla Institute of Technology and Science-Pilani, Hyderabad Campus, Secunderabad 500078, IndiaDepartment of Computer Science, College of Engineering, Tennessee Tech University, Cookeville, TN 38505, USADepartment of Computer Science and Information Systems, Birla Institute of Technology and Science-Pilani, Hyderabad Campus, Secunderabad 500078, IndiaThe unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest numerous approaches to enhance cloud authentication towards robustness. User names and associated passwords have been a common practice for long as Single Factor Authentication. However, advancements in the speed of computing and the usage of simple methods, starting from the Brute Force technique to the implementation of advanced and efficient crytographic algorithms, have posed several threats and vulnerabilities for authentication systems, leading to the degradation of their effectiveness. Multi-factor authentication has emerged as a robust means of securing the cloud using simultaneous and multiple means of authentication factors. This employs multiple levels of cascaded authentication checks. This paper covers an extensive and systematic survey of various factors towards their adoption and suitability for authentication for multi-factor authentication mechanisms. The inference drawn from the survey is in terms of arriving at a unique authentication factor that does not require any additional, specialized hardware or software for multi-factor authentication. Such authentication also uses the distinct biometric characteristics of the concerned user in the process. This arrangement augments the secured and robust user authentication process. The mechanism is also assessed as an effective means against impersonation attacks.https://www.mdpi.com/1999-5903/15/4/146access controlauthentication managementauthorization managementbiometricscloud computingcloud IAM
spellingShingle Soumya Prakash Otta
Subhrakanta Panda
Maanak Gupta
Chittaranjan Hota
A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure
Future Internet
access control
authentication management
authorization management
biometrics
cloud computing
cloud IAM
title A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure
title_full A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure
title_fullStr A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure
title_full_unstemmed A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure
title_short A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure
title_sort systematic survey of multi factor authentication for cloud infrastructure
topic access control
authentication management
authorization management
biometrics
cloud computing
cloud IAM
url https://www.mdpi.com/1999-5903/15/4/146
work_keys_str_mv AT soumyaprakashotta asystematicsurveyofmultifactorauthenticationforcloudinfrastructure
AT subhrakantapanda asystematicsurveyofmultifactorauthenticationforcloudinfrastructure
AT maanakgupta asystematicsurveyofmultifactorauthenticationforcloudinfrastructure
AT chittaranjanhota asystematicsurveyofmultifactorauthenticationforcloudinfrastructure
AT soumyaprakashotta systematicsurveyofmultifactorauthenticationforcloudinfrastructure
AT subhrakantapanda systematicsurveyofmultifactorauthenticationforcloudinfrastructure
AT maanakgupta systematicsurveyofmultifactorauthenticationforcloudinfrastructure
AT chittaranjanhota systematicsurveyofmultifactorauthenticationforcloudinfrastructure