Proceedings of the International Conference on Future Networks and Distributed Systems 2017
DOI: 10.1145/3102304.3102343
|View full text |Cite
|
Sign up to set email alerts
|

Two Factor Vs Multi-factor, an Authentication Battle in Mobile Cloud Computing Environments

Abstract: Mobile devices offer a convenient way of accessing our digital lives and many of those devices hold sensitive data that needs protecting. Mobile and wireless communications networks, combined with cloud computing as Mobile Cloud Computing (MCC), have emerged as a new way to provide a rich computational environment for mobile users, and business opportunities for cloud providers and network operators. It is the convenience of the cloud service and the ability to sync across multiple platforms/devices that has b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
20
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(20 citation statements)
references
References 13 publications
0
20
0
Order By: Relevance
“…Authentication remains a fundamental safeguard against illegitimate access to the device or any other sensitive application, whether offline or online [7][8][9] (see Figure 1). Back in time, the transactions were authenticated primarily by physical presence, i.e., for example, by applying the wax seal [10].…”
Section: Introductionmentioning
confidence: 99%
“…Authentication remains a fundamental safeguard against illegitimate access to the device or any other sensitive application, whether offline or online [7][8][9] (see Figure 1). Back in time, the transactions were authenticated primarily by physical presence, i.e., for example, by applying the wax seal [10].…”
Section: Introductionmentioning
confidence: 99%
“…It can allow office users to use the resources and services of the system in an authorized way and prevent illegal users from accessing the system's resources and services. Authentication is considered an essential component to protect the system, device or application from unlawful access-either in a direct or an indirect way [4][5][6]. To begin with, there was only one factor used to authenticate the users in the system; however, this approach can be easily compromised, particularly in the case of passwords [7,8].…”
Section: Introductionmentioning
confidence: 99%
“…However, this technology introduced a wide range of security threats that has not been addressed in the classical information and network security research [3], [4], [5], [6], [7], [8], [9]. Radio Frequency Identification (RFID) has exponentially and increasingly become more in-demand with major companies now incorporating RFID into their technology.…”
Section: Introductionmentioning
confidence: 99%