Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/118831
Title: Secure authentication framework for cloud
Researcher: Binu, Sumitra
Guide(s): Raj, Pethuru
Keywords: Cloud Computing
Security
Two-factor authentication
University: CHRIST University
Completed Date: 31-7-2016
Abstract: The growing popularity of cloud based services is prompting organizations to consider shifting applications and data onto cloud. However, organizations dealing with highly sensitive information are apprehensive of moving its applications and data to public cloud owing to concern about security of its information. It is hence incumbent on service providers that only legitimate Users will access its services and resources in cloud. newlineVerifying authenticity of remote users is a necessary pre-requisite in a cloud environment before allowing access to secure resources/services/ applications. The simplest and most commonly used user authentication mechanism is password based authentication. However, Users tend to choose easy to remember password, and many a times use same password for multiple accounts, which makes it often the weakest link in security. Furthermore, service providers authenticating Users on the basis of password, stores password verification information in their databases and such authentication schemes with verification table are known to be vulnerable to various attacks. newlineFrom the perspective of authentication requirements, service providers in a cloud environment can be broadly categorized into two. Those service providers dealing with highly sensitive information and working in a regulated environment can be grouped into category one as in those offering services for sectors like health care, finance. These providers require a strong and secure authentication mechanism to authenticate its users, without any additional functionality. Similarly, there is a second category of service providers dealing with secure information but operate in a collaborative environment as providers providing their applications bundled through a web portal. To provide the Users with a seamless authentication experience, while accessing multiple services during a session, the second category of service providers prefer to have Single Sign-on functionality.
Pagination: A4
URI: http://hdl.handle.net/10603/118831
Appears in Departments:Department of Computer Science

Files in This Item:
File Description SizeFormat 
01_title.pdf.pdfAttached File96.49 kBAdobe PDFView/Open
02_notification.pdf1.18 MBAdobe PDFView/Open
03_abstract.pdf107.21 kBAdobe PDFView/Open
04_declaration.pdf.pdf58.63 kBAdobe PDFView/Open
05_acknowledgement.pdf.pdf42.45 kBAdobe PDFView/Open
06_contents.pdf.pdf281.83 kBAdobe PDFView/Open
07_list of tables.pdf.pdf245.67 kBAdobe PDFView/Open
08_list of figures.pdf.pdf273.69 kBAdobe PDFView/Open
09_chapter1.pdf.pdf166.69 kBAdobe PDFView/Open
10_chapter2.pdf.pdf1.26 MBAdobe PDFView/Open
11_chapter3.pdf.pdf1.6 MBAdobe PDFView/Open
12_chapter4.pdf.pdf1.8 MBAdobe PDFView/Open
13_chapter5.pdf.pdf1.09 MBAdobe PDFView/Open
14_conclusions.pdf.pdf110.28 kBAdobe PDFView/Open
15_bibliography.pdf.pdf379.09 kBAdobe PDFView/Open


Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.