skip to main content
10.1145/3102304.3102343acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

Two Factor Vs Multi-factor, an Authentication Battle in Mobile Cloud Computing Environments

Published: 19 July 2017 Publication History

Abstract

Mobile devices offer a convenient way of accessing our digital lives and many of those devices hold sensitive data that needs protecting. Mobile and wireless communications networks, combined with cloud computing as Mobile Cloud Computing (MCC), have emerged as a new way to provide a rich computational environment for mobile users, and business opportunities for cloud providers and network operators. It is the convenience of the cloud service and the ability to sync across multiple platforms/devices that has become the attraction to cloud computing. However, privacy, security and trust issues may still be a barrier that impedes the adoption of MCC by some undecided potential users. Those users still need to be convinced of the security of mobile devices, wireless networks and cloud computing. This paper is the result of a comprehensive review of one typical secure measure-authentication methodology research, spanning a period of five years from 2012--2017. MCC capabilities for sharing distributed resources is discussed. Authentication in MCC is divided in to two categories and the advantages of one category over its counterpart are presented, in the process of attempting to identify the most secure authentication scheme.

References

[1]
M. Hammoudeh, R. Newman, C. Dennett, S. Mount and O. Aldabbas. 2015. Map as a Service: A Framework for Visualising and Maximising Information Return from Multi-Modal Wireless Sensor Networks. Sensors, Vol 15, Issue 9: p. 22970--23003. Multidisciplinary Digital Publishing Institute.
[2]
A. Abuarqoub, M. Hammoudeh, B. Adebisi, S. Jabbar, A. Bounceur and H. Al-Bashar. 2017. Dynamic Clustering and Management of Mobile Wireless Sensor Networks. Computer Networks, Vol 117, p. 62--75. Elsevier.
[3]
M. Hammoudeh, F. Al-Fayez, H. Lloyd, R. Newman, B. Adebisi, A. Bounceur and A. Abuarqoub. 2017. A Wireless Sensor Network Border Monitoring System: Deployment Issues and Routing Protocols. IEEE Sensors Journal, IEEE.
[4]
I. Al Rassan and H. Al Shaher. 2013. Securing Mobile Cloud using Finger Print Authentication. International Journal of Network Security & Its Applications (IJNSA), Vol 5 no 6. Academy & Industry Collaboration Centre (AIRCC)
[5]
L. Badger, T. Grance, R. Patt-Corner and J. Voas. 2011. Draft Cloud Computing Synopsis and Recommendations. National Institute of Standards and Technology (NIST), Special Publication 800--146. US Department of Commerce. http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-146.pdf
[6]
I. Ghafir, V. Prenosil, J. Svoboda and M. Hammoudeh. 2016. A Survey on Network Security Monitoring Systems. IEEE International Conference on Future Internet of Things and Cloud Workshops (FiCloudW). IEEE, p.77--82.
[7]
I. Ghafir, V. Prenosil, A. Alhejailan and M. Hammoudeh. 2016. Social Engineering Attack Strategies and Defence Approaches. 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, p. 145--149.
[8]
I. Ghafir, V. Prenosil and M. Hammoudeh. 2016. Botnet Command and Control Traffic Detection Challenges: A Correlation-based Solution. theIRED.
[9]
H. Khan, A. Atwater and U. Hengartner. 2014. An implicit authentication framework for Android. Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, MobiCom '14. ACM, New York, NY, USA, pp. 507--518.
[10]
F. Omri, R. Hamila, S. Foufou and M. Jarraya. 2012. Cloud-ready biometric system for Mobile Security Access. Networked Digital Technologies, communications in computer and information science. p. 192--200.
[11]
C. Rathgeb, and A. Uhl. 2011. A Survey on biometric cryptosystems and cancelable biometrics. EURASIP Journal on Information Security, Springer.
[12]
N.F. Moco, P.L. Correia and L.D. Soares. 2014.Smartphone-Based Palmprint Recognition System. 21st International Conference on Telecommunications (ICT).
[13]
S. Binu, A. Mohan, K.T. Deepak, S. Manohar, M. Mohammed and R. Pethuru. 2015. A Proof of Concept Implementation of a Mobile Based Authentication Scheme without Password Table for Cloud Environment. IEEE International Advance Computing Conference (IACC).
[14]
S. Dey, S. Sampalli and Q. Ye. 2013. Message digest as authentication entity for mobile cloud computing. 32nd international performance computing and communications conference. San Diego, USA: IEEE
[15]
D. Schwab and L. Yang. 2013. Entity authentication in a mobile-cloud environment. In: 8th annual cyber security and information intelligence research workshop: federal cyber security R and D program thrusts. Oak Ridge, United States: ACM.
[16]
Y.S. Jeong, J.S. Park and J.H. Park. 2015. International Journal of Communication Systems. Int. J. Commun. Syst. 2015; 28:659--674.
[17]
K.W. Hussein, N.F.M. Sani, R. Mahmod and M.T. Abdullah. 2013. Design and Implementation of Multi Factor Mechanism for Secure Authentication System. International Journal of Computer Science and Information Security 11.7: 31--37.
[18]
N.A. Albahbooh and P. Bours. 2015. A Mobile Phone Device as a Biometrics Authentication Method for an ATM Terminal, in Computing Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), IEEE International Conference.
[19]
M. Aldwairi, R. Masri, H. Hassan and M. El Barachi. 2016. A Novel Multi-Stage Authentication System for Mobile Applications. International Journal of Computer Science and Information Security. Vol 14. Issue 7.
[20]
B. Schneier. 2005. The Failure of Two-Factor Authentication. https://www.schneier.com/blog/archives/2005/03/the_failure_of.html.
[21]
C. Braz and J.M. Robert. 2006. Security and usability: the case of the user authentication methods. In: Proceedings of the 18th international conference of the association francophone d'interaction homme--machine. Montreal, Canada: ACM; 2006. p. 199--203.

Cited By

View all
  • (2024)Enhanced Cloud Computing Security Using Application-Based Multi-Factor Authentication (MFA) for Communication SystemsEuropean Journal of Electrical Engineering and Computer Science10.24018/ejece.2024.8.2.5938:2(1-8)Online publication date: 7-Mar-2024
  • (2024)Reducing the Communication Overhead in Novel Data Sharing Algorithm in Cloud Data Storage Over Triple Data Encryption Standard Algorithm2024 Second International Conference on Advances in Information Technology (ICAIT)10.1109/ICAIT61638.2024.10690317(1-4)Online publication date: 24-Jul-2024
  • (2024)Improving Resource Security by Integrating Authentication and Cryptography2024 1st International Conference on Electrical, Computer, Telecommunication and Energy Technologies (ECTE-Tech)10.1109/ECTE-Tech62477.2024.10851191(1-8)Online publication date: 17-Dec-2024
  • Show More Cited By

Index Terms

  1. Two Factor Vs Multi-factor, an Authentication Battle in Mobile Cloud Computing Environments

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ICFNDS '17: Proceedings of the International Conference on Future Networks and Distributed Systems
      July 2017
      325 pages
      ISBN:9781450348447
      DOI:10.1145/3102304
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      In-Cooperation

      • LABSTICC: Labsticc

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 19 July 2017

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Authentication
      2. Biometrics
      3. Man-in-the-middle Attack
      4. Mobile Cloud Computing
      5. Multi-factor
      6. Networks
      7. SSO
      8. Security
      9. Sniffing
      10. Two Factor
      11. Wireless

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      ICFNDS '17

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)56
      • Downloads (Last 6 weeks)4
      Reflects downloads up to 22 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Enhanced Cloud Computing Security Using Application-Based Multi-Factor Authentication (MFA) for Communication SystemsEuropean Journal of Electrical Engineering and Computer Science10.24018/ejece.2024.8.2.5938:2(1-8)Online publication date: 7-Mar-2024
      • (2024)Reducing the Communication Overhead in Novel Data Sharing Algorithm in Cloud Data Storage Over Triple Data Encryption Standard Algorithm2024 Second International Conference on Advances in Information Technology (ICAIT)10.1109/ICAIT61638.2024.10690317(1-4)Online publication date: 24-Jul-2024
      • (2024)Improving Resource Security by Integrating Authentication and Cryptography2024 1st International Conference on Electrical, Computer, Telecommunication and Energy Technologies (ECTE-Tech)10.1109/ECTE-Tech62477.2024.10851191(1-8)Online publication date: 17-Dec-2024
      • (2023)A Security Method for Cloud Storage Using Data ClassificationInternational Journal of Grid and High Performance Computing10.4018/IJGHPC.32960215:1(1-17)Online publication date: 24-Mar-2023
      • (2023)Multi-Factor Authentication Protocol Based on Electrocardiography Signals for a Mobile Cloud Computing EnvironmentMobile Computing Solutions for Healthcare Systems10.2174/9789815050592123010009(62-88)Online publication date: 26-Feb-2023
      • (2023)An Innovative Risk Score Based Corporate Access Control Management System2023 7th International Symposium on Innovative Approaches in Smart Technologies (ISAS)10.1109/ISAS60782.2023.10391575(1-5)Online publication date: 23-Nov-2023
      • (2023)Framework for Multi-factor Authentication with Dynamically Generated PasswordsAdvances in Information and Communication10.1007/978-3-031-28073-3_39(563-576)Online publication date: 2-Mar-2023
      • (2022)Highly Classified with Two Factor Authentication Encrypted Secured MailEmerging Research in Computing, Information, Communication and Applications10.1007/978-981-19-5482-5_5(53-59)Online publication date: 13-Dec-2022
      • (2021)AAAA: SSO and MFA Implementation in Multi-Cloud to Mitigate Rising Threats and Concerns Related to User MetadataApplied Sciences10.3390/app1107301211:7(3012)Online publication date: 27-Mar-2021
      • (2021)Real-Time Behavioral Biometric Information Security System for Assessment Fraud Detection2021 IEEE International Conference on Computing (ICOCO)10.1109/ICOCO53166.2021.9673568(186-191)Online publication date: 17-Nov-2021
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media