Abstract
Security and privacy concerns when using cloud computing services are similar to those of the traditional noncloud services. Cloud Computing represents dynamic area during present days with new security level and trust. In this paper, we have analyzed the authentication techniques adopted by the users. There are various cloud computing issues like security, privacy, trust etc. which should be solved quickly to increase the user trust in cloud-based services. There are so many techniques to secure data in cloud like user id and password, pattern lock system, biometric system, one-time password (OTP) via email or SMS etc. Through this paper, we have tried to analyze how multifactor authentication techniques are adopted by end users. The result obtained after the analysis related to authentication techniques adopted and preferred by the users are given using various visual summaries.
Authors’ contributions
The two authors contributed equally to this work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Retrieved March 23, 2015, from http://serverfault.com/questions/57077/what-is-the-difference-between-authentication-and-authorization.
Retrieved March 25, 2015, from http://www.nist.gov/itl/cloud/.
Vikas, K., Swetha, M. S., Muneshwara, M. S., & Prakash, S. (2012). Cloud computing: Towards case study of data security mechanism. In International Journal of Advanced Technology & Engineering. Research (IJATER), 2(4), 1–8.
Retrieved April 3, 2015, from http://searchsecurity.techtarget.com/tip/ID-and-password-authentication-Keeping-data-safe-with-management-and-policies.
Retrieved November 30, 2014, from http://en.wikipedia.org/wiki/Multi-factor_authentication.
Retrieved December 10, 2014, from http://www.secureauth.com/blog/cloud-storage-2-factor-authentication-review/.
Rupal, R., & Sreeja, N. (2014). A novel graphical password approach for accessing cloud and data verification. International Journal of Research in Engineering and Technology, 3(05), 734–738.
Retrieved April 6, 2015, from http://en.wikipedia.org/wiki/QR_code.
Retrieved April 6, 2015, from http://www.robabdul.com/marketing/qr-code-advantages-and-disadvantages/.
Bansi, K., & Kuntal, P. (January–June 2015). A novel model for security and data access for jointly accessing the cloud service. BIJIT—BVICAM’s International Journal of Information Technology, 7(1), 841–844.
Acknowledgments
We would like to thank Mr. Raghu Khimani, Cyber Crime Expert/Advisor for his valuable support during the execution of this research work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Khimani, B., Patel, K. (2016). Analysis of Authentication Techniques Adopted by End Users in Real-Life Cloud Implementation. In: Satapathy, S., Joshi, A., Modi, N., Pathak, N. (eds) Proceedings of International Conference on ICT for Sustainable Development. Advances in Intelligent Systems and Computing, vol 409. Springer, Singapore. https://doi.org/10.1007/978-981-10-0135-2_9
Download citation
DOI: https://doi.org/10.1007/978-981-10-0135-2_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0133-8
Online ISBN: 978-981-10-0135-2
eBook Packages: EngineeringEngineering (R0)