A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest numerous approaches to enhance cloud authenticati...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-04-01
|
Series: | Future Internet |
Subjects: | |
Online Access: | https://www.mdpi.com/1999-5903/15/4/146 |
_version_ | 1797605406102519808 |
---|---|
author | Soumya Prakash Otta Subhrakanta Panda Maanak Gupta Chittaranjan Hota |
author_facet | Soumya Prakash Otta Subhrakanta Panda Maanak Gupta Chittaranjan Hota |
author_sort | Soumya Prakash Otta |
collection | DOAJ |
description | The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest numerous approaches to enhance cloud authentication towards robustness. User names and associated passwords have been a common practice for long as Single Factor Authentication. However, advancements in the speed of computing and the usage of simple methods, starting from the Brute Force technique to the implementation of advanced and efficient crytographic algorithms, have posed several threats and vulnerabilities for authentication systems, leading to the degradation of their effectiveness. Multi-factor authentication has emerged as a robust means of securing the cloud using simultaneous and multiple means of authentication factors. This employs multiple levels of cascaded authentication checks. This paper covers an extensive and systematic survey of various factors towards their adoption and suitability for authentication for multi-factor authentication mechanisms. The inference drawn from the survey is in terms of arriving at a unique authentication factor that does not require any additional, specialized hardware or software for multi-factor authentication. Such authentication also uses the distinct biometric characteristics of the concerned user in the process. This arrangement augments the secured and robust user authentication process. The mechanism is also assessed as an effective means against impersonation attacks. |
first_indexed | 2024-03-11T05:00:39Z |
format | Article |
id | doaj.art-f0497ab8aeba411da7fa2da2778b52ce |
institution | Directory Open Access Journal |
issn | 1999-5903 |
language | English |
last_indexed | 2024-03-11T05:00:39Z |
publishDate | 2023-04-01 |
publisher | MDPI AG |
record_format | Article |
series | Future Internet |
spelling | doaj.art-f0497ab8aeba411da7fa2da2778b52ce2023-11-17T19:20:18ZengMDPI AGFuture Internet1999-59032023-04-0115414610.3390/fi15040146A Systematic Survey of Multi-Factor Authentication for Cloud InfrastructureSoumya Prakash Otta0Subhrakanta Panda1Maanak Gupta2Chittaranjan Hota3Department of Computer Science and Information Systems, Birla Institute of Technology and Science-Pilani, Hyderabad Campus, Secunderabad 500078, IndiaDepartment of Computer Science and Information Systems, Birla Institute of Technology and Science-Pilani, Hyderabad Campus, Secunderabad 500078, IndiaDepartment of Computer Science, College of Engineering, Tennessee Tech University, Cookeville, TN 38505, USADepartment of Computer Science and Information Systems, Birla Institute of Technology and Science-Pilani, Hyderabad Campus, Secunderabad 500078, IndiaThe unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest numerous approaches to enhance cloud authentication towards robustness. User names and associated passwords have been a common practice for long as Single Factor Authentication. However, advancements in the speed of computing and the usage of simple methods, starting from the Brute Force technique to the implementation of advanced and efficient crytographic algorithms, have posed several threats and vulnerabilities for authentication systems, leading to the degradation of their effectiveness. Multi-factor authentication has emerged as a robust means of securing the cloud using simultaneous and multiple means of authentication factors. This employs multiple levels of cascaded authentication checks. This paper covers an extensive and systematic survey of various factors towards their adoption and suitability for authentication for multi-factor authentication mechanisms. The inference drawn from the survey is in terms of arriving at a unique authentication factor that does not require any additional, specialized hardware or software for multi-factor authentication. Such authentication also uses the distinct biometric characteristics of the concerned user in the process. This arrangement augments the secured and robust user authentication process. The mechanism is also assessed as an effective means against impersonation attacks.https://www.mdpi.com/1999-5903/15/4/146access controlauthentication managementauthorization managementbiometricscloud computingcloud IAM |
spellingShingle | Soumya Prakash Otta Subhrakanta Panda Maanak Gupta Chittaranjan Hota A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure Future Internet access control authentication management authorization management biometrics cloud computing cloud IAM |
title | A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure |
title_full | A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure |
title_fullStr | A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure |
title_full_unstemmed | A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure |
title_short | A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure |
title_sort | systematic survey of multi factor authentication for cloud infrastructure |
topic | access control authentication management authorization management biometrics cloud computing cloud IAM |
url | https://www.mdpi.com/1999-5903/15/4/146 |
work_keys_str_mv | AT soumyaprakashotta asystematicsurveyofmultifactorauthenticationforcloudinfrastructure AT subhrakantapanda asystematicsurveyofmultifactorauthenticationforcloudinfrastructure AT maanakgupta asystematicsurveyofmultifactorauthenticationforcloudinfrastructure AT chittaranjanhota asystematicsurveyofmultifactorauthenticationforcloudinfrastructure AT soumyaprakashotta systematicsurveyofmultifactorauthenticationforcloudinfrastructure AT subhrakantapanda systematicsurveyofmultifactorauthenticationforcloudinfrastructure AT maanakgupta systematicsurveyofmultifactorauthenticationforcloudinfrastructure AT chittaranjanhota systematicsurveyofmultifactorauthenticationforcloudinfrastructure |