Skip to main content

Analysis of Authentication Techniques Adopted by End Users in Real-Life Cloud Implementation

  • Conference paper
  • First Online:
Proceedings of International Conference on ICT for Sustainable Development

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 409))

  • 1414 Accesses

Abstract

Security and privacy concerns when using cloud computing services are similar to those of the traditional noncloud services. Cloud Computing represents dynamic area during present days with new security level and trust. In this paper, we have analyzed the authentication techniques adopted by the users. There are various cloud computing issues like security, privacy, trust etc. which should be solved quickly to increase the user trust in cloud-based services. There are so many techniques to secure data in cloud like user id and password, pattern lock system, biometric system, one-time password (OTP) via email or SMS etc. Through this paper, we have tried to analyze how multifactor authentication techniques are adopted by end users. The result obtained after the analysis related to authentication techniques adopted and preferred by the users are given using various visual summaries.

Authors’ contributions

The two authors contributed equally to this work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Retrieved March 23, 2015, from http://serverfault.com/questions/57077/what-is-the-difference-between-authentication-and-authorization.

  2. Retrieved March 25, 2015, from http://www.nist.gov/itl/cloud/.

  3. Vikas, K., Swetha, M. S., Muneshwara, M. S., & Prakash, S. (2012). Cloud computing: Towards case study of data security mechanism. In International Journal of Advanced Technology & Engineering. Research (IJATER), 2(4), 1–8.

    Google Scholar 

  4. Retrieved April 3, 2015, from http://searchsecurity.techtarget.com/tip/ID-and-password-authentication-Keeping-data-safe-with-management-and-policies.

  5. Retrieved November 30, 2014, from http://en.wikipedia.org/wiki/Multi-factor_authentication.

  6. Retrieved December 10, 2014, from http://www.secureauth.com/blog/cloud-storage-2-factor-authentication-review/.

  7. Rupal, R., & Sreeja, N. (2014). A novel graphical password approach for accessing cloud and data verification. International Journal of Research in Engineering and Technology, 3(05), 734–738.

    Article  Google Scholar 

  8. Retrieved April 6, 2015, from http://en.wikipedia.org/wiki/QR_code.

  9. Retrieved April 6, 2015, from http://www.robabdul.com/marketing/qr-code-advantages-and-disadvantages/.

  10. Bansi, K., & Kuntal, P. (January–June 2015). A novel model for security and data access for jointly accessing the cloud service. BIJIT—BVICAM’s International Journal of Information Technology, 7(1), 841–844.

    Google Scholar 

Download references

Acknowledgments

We would like to thank Mr. Raghu Khimani, Cyber Crime Expert/Advisor for his valuable support during the execution of this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bansi Khimani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Khimani, B., Patel, K. (2016). Analysis of Authentication Techniques Adopted by End Users in Real-Life Cloud Implementation. In: Satapathy, S., Joshi, A., Modi, N., Pathak, N. (eds) Proceedings of International Conference on ICT for Sustainable Development. Advances in Intelligent Systems and Computing, vol 409. Springer, Singapore. https://doi.org/10.1007/978-981-10-0135-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0135-2_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0133-8

  • Online ISBN: 978-981-10-0135-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics