Multi User Authentication for Reliable Data Storage in Cloud Computing

Authors

  • Richa Shah Department of Information Technology, NRI Institute of Information Science and Technology, Bhopal (M.P), India Author
  • Shatendra Kumar Dubey Department of Information Technology, NRI Institute of Information Science and Technology, Bhopal (M.P), India Author

DOI:

https://doi.org/10.32628/CSEIT2410138

Keywords:

Multi-user authentication, cloud computing, reliable data storage, Applications, Applications Integration, Challenges and solutions, Implementation

Abstract

Today's digital environment, Multi-user authentication plays a crucial role in ensuring data integrity and confidentiality, emphasizing its importance of reliable and secure data storage in cloud computing environments. The exploration extends to the strategies for implementing secure multi-user authentication, encompassing aspects such as password policies, biometric verification, encryption, role-based access control (RBAC), and multi-factor authentication (MFA). The issue of reliable data storage is covered in further detail, on the importance of data availability and integrity.  Real-world applications of multi-user authentication and reliable data storage are examine. The paper elucidates how these applications enhance overall security, mitigating risks associated with unauthorized access and cyber threats.
The paper concludes by integration of multi-user authentication and reliable data storage is explored through considerations the critical role of multi-user authentication in ensuring reliable data storage in cloud computing such as secure API access, token-based authentication, and adherence to security best practices. Challenges in user authentication are addressed, with solutions proposed for seamless access across cloud platforms, including the adoption of Single Sign-On (SSO), multi-factor authentication, regular security audits, collaboration with cloud security experts, and user education and training. The synthesis of challenges, benefits, drawbacks, and implementation strategies provides organizations with a comprehensive guide for enhancing their data security measures.
              

Downloads

Download data is not yet available.

References

Bellare, M., Tackmann, B. (2016). The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3. In: Robshaw, M., Katz, J. (eds) Advances in Cryptology – CRYPTO 2016. CRYPTO 2016. Lecture Notes in Computer Science(), vol 9814. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-53018-4_10 DOI: https://doi.org/10.1007/978-3-662-53018-4_10

Yakoob, S., Krishna Reddy, V., Dastagiraiah, C. (2017). Multi User Authentication in Reliable Data Storage in Cloud. In: Satapathy, S., Bhateja, V., Raju, K., Janakiramaiah, B. (eds) Computer Communication, Networking and Internet Security. Lecture Notes in Networks and Systems, vol 5. Springer, Singapore. https://doi.org/10.1007/978-981-10-3226-4_54 DOI: https://doi.org/10.1007/978-981-10-3226-4_54

Mostafa, A.M.; Ezz, M.; Elbashir, M.K.; Alruily, M.; Hamouda, E.; Alsarhani, M.; Said, W. Strengthening Cloud Security: An Innovative Multi-Factor Multi-Layer Authentication Framework for Cloud User Authentication. Appl. Sci. 2023, 13, 10871. https://doi.org/10.3390/app131910871

Mostafa, A.M.; Ezz, M.; Elbashir, M.K.; Alruily, M.; Hamouda, E.; Alsarhani, M.; Said, W. Strengthening Cloud Security: An Innovative Multi-Factor Multi-Layer Authentication Framework for Cloud User Authentication. Appl. Sci. 2023, 13, 10871. https://doi.org/10.3390/app131910871 DOI: https://doi.org/10.3390/app131910871

Deshpande, Prachi & Sharma, Subhash & Peddoju, Sateesh Kumar. (2016). Data Storage Security in Cloud Paradigm. 10.1007/978-981-10-0448-3_20. DOI: https://doi.org/10.1007/978-981-10-0448-3_20

Iftikhar, Engr. U., Asrar, Engr. K., Waqas, Engr. Dr. M., & Ali, Engr. Dr. S.A. (2021). Access Management Using Knowledge Based MultiFactor Authentication In Information Security. International Journal of Computer Science and Network Security , 21 (7), 119–124. https://doi.org/10.22937/IJCSNS.2021.21.7.15

ALI, Belal ALSHIECK. Efficient trust-aware authentication and task offloading in Multi-access Edge Computing using a dual fuzzy method based Zero Trust Security framework. Diss. RMIT University, 2023.

Tahir, Adnan, et al. "Reliable Storage of Cloud Data." Encyclopedia. Web. 12 May, 2023.

A. Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee and J. C. S. Lui, "A Secure Cloud Backup System with Assured Deletion and Version Control," 2011 40th International Conference on Parallel Processing Workshops, Taipei, Taiwan, 2011, pp. 160-167, doi: 10.1109/ICPPW.2011.17. DOI: https://doi.org/10.1109/ICPPW.2011.17

J. Tucek, P. Stanton, E. Haubert, R. Hasan, L. Brumbaugh and W. Yurcik, "Trade-offs in protecting storage: a meta-data comparison of cryptographic, backup/versioning, immutable/tamper-proof, and redundant storage solutions," 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST'05), Monterey, CA, USA, 2005, pp. 329-340, doi: 10.1109/MSST.2005.39. DOI: https://doi.org/10.1109/MSST.2005.39

Sun Y, Zhang J, Xiong Y, Zhu G. Data Security and Privacy in Cloud Computing. International Journal of Distributed Sensor Networks. 2014;10(7). doi:10.1155/2014/190903 DOI: https://doi.org/10.1155/2014/190903

Rajasekar, Vani, et al. "Secure remote user authentication scheme on health care, IoT and cloud applications: a multilayer systematic survey." Acta Polytechnica Hungarica 18.3 (2021): 87-106. DOI: https://doi.org/10.12700/APH.18.3.2021.3.5

Koehler, Samuel, et al. "Real World Applications of Cloud Computing: Architecture, Reasons for Using, and Challenges." Asia Pacific Journal of Energy and Environment 7.2 (2020): 93-102. DOI: https://doi.org/10.18034/apjee.v7i2.698

Lodder, Michael. "Token Based Authentication and Authorization with Zero-Knowledge Proofs for Enhancing Web API Security and Privacy." (2023).

Jayashankar, Sandeep & Thayyile Kandy, Subin. (2020). Demystifying Tokens for Securing Enterprise APIs. 18. 14.

Lodderstedt, T., et al. "OAuth 2.0 Security Best Current Practice (draft-ietf-oauth-security-topics-16)." Internet Engineering Task Force (IETF) (2020).

Carvallo, Pamela, et al. "Multi-cloud applications security monitoring." Green, Pervasive, and Cloud Computing: 12th International Conference, GPC 2017, Cetara, Italy, May 11-14, 2017, Proceedings 12. Springer International Publishing, 2017.

Vesireddy, Akhil Kumar Reddy, and Sharan Manohar Shetty. "Cloud computing security issues in delivery models and solutions."

Carvallo, Pamela, et al. "Multi-cloud applications security monitoring." Green, Pervasive, and Cloud Computing: 12th International Conference, GPC 2017, Cetara, Italy, May 11-14, 2017, Proceedings 12. Springer International Publishing, 2017.

K. A. A. Bakar and G. R. Haron, "Adaptive authentication: Issues and challenges," 2013 World Congress on Computer and Information Technology (WCCIT), Sousse, Tunisia, 2013, pp. 1-6, doi: 10.1109/WCCIT.2013.6618657. DOI: https://doi.org/10.1109/WCCIT.2013.6618657

Cardoso, Igor Duarte, et al. "Seamless integration of cloud and fog networks." International Journal of Network Management 26.6 (2016): 435-460. DOI: https://doi.org/10.1002/nem.1944

Megouache, Leila & Zitouni, Abdelhafid & Djoudi, Mahieddine. (2020). Ensuring user authentication and data integrity in multi-cloud environment. Human-centric Computing and Information Sciences. 10. 10.1186/s13673-020-00224-y. DOI: https://doi.org/10.1186/s13673-020-00224-y

Cakir, Ece. "Single Sign-On: Risks and Opportunities of Using SSO (Single Sign-On) in a Complex System Environment with Focus on Overall Security Aspects." (2013).

Raj, P., Raman, A. (2018). Multi-cloud Management: Technologies, Tools, and Techniques. In: Software-Defined Cloud Centers. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-78637-7_10 DOI: https://doi.org/10.1007/978-3-319-78637-7_10

Rasheed, Hassan. "Data and infrastructure security auditing in cloud computing environments." International Journal of Information Management 34.3 (2014): 364-368. DOI: https://doi.org/10.1016/j.ijinfomgt.2013.11.002

Dawood M, Tu S, Xiao C, Alasmary H, Waqas M, Rehman SU. Cyberattacks and Secursity of Cloud Computing: A Complete Guideline. Symmetry. 2023; 15(11):1981. https://doi.org/10.3390/sym15111981 DOI: https://doi.org/10.3390/sym15111981

Alenezi, Mamdouh. "Safeguarding Cloud Computing Infrastructure: A Security Analysis." Computer Systems Science & Engineering 37.2 (2021). DOI: https://doi.org/10.32604/csse.2021.015282

M. Nabeel, "The Many Faces of End-to-End Encryption and Their Security Analysis," 2017 IEEE International Conference on Edge Computing (EDGE), Honolulu, HI, USA, 2017, pp. 252-259, doi: 10.1109/IEEE.EDGE.2017.47. DOI: https://doi.org/10.1109/IEEE.EDGE.2017.47

Downloads

Published

11-03-2024

Issue

Section

Research Articles

Similar Articles

1-10 of 457

You may also start an advanced similarity search for this article.