An Extensive Survey on Data Authentication Schemes in Cloud Computing

Cloud computing is a rising innovation in appropriated processing which encourages pay per model according to client request and prerequisite. Cloud comprises an accumulation of virtual machine which incorporates both computational and storeroom. The essential point of cloud computing is to give effective access to remote and geologically disseminated assets. Data Security is the main issue in almost all information system. Cloud computing is a modern advancement in information technology and application are facilitated to users as "Services". In cloud computing data is distributed and scattered in various places so, Data Security is the main problem in a cloud environment. Lots of work already done in securing the cloud data, data security is still the main obstacle to the development of cloud environment. This paper reviews the various security challenges and techniques to implement security for the purpose of achieving data protection in a cloud environment.

[1]  L. Arockiam,et al.  A Comparative Analysis of Encryption Techniques and Data Security Issues in Cloud Computing , 2014 .

[2]  Ahmed A. Abdel-Hafez,et al.  Secure and Efficient Authentication Scheme for Cloud Computing , 2016 .

[3]  R. H. Goudar,et al.  Cloud Computing - Research Issues, Challenges, Architecture, Platforms and Applications: A Survey , 2012 .

[4]  Qi Luo,et al.  Cloud-Based Lightweight RFID Mutual Authentication Protocol , 2017, 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC).

[5]  Ambrosio Toval,et al.  Security in cloud computing: A mapping study , 2015 .

[6]  Bhavani Shankar,et al.  Study of security issues in cloud computing , 2011 .

[7]  Supriya Mandhare,et al.  An intelligent approach for data fortification in cloud computing , 2014, 2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014).

[8]  Fahd M. Al-Dosari,et al.  A Secure Cloud Computing Model based on Data Classification , 2015, ANT/SEIT.

[9]  Wentao Liu,et al.  Research on cloud computing security problem and strategy , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).

[10]  Sushmita Ruj,et al.  Privacy Preserving Access Control with Authentication for Securing Data in Clouds , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).

[11]  M. Phil,et al.  PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .

[12]  Saudi Arabia Securing Mobile Cloud Using Finger Print Authentication , 2013 .

[13]  Monika Bansal,et al.  Deployment of secure sharing: Authenticity and authorization using cryptography in cloud environment , 2015, 2015 International Conference on Advances in Computer Engineering and Applications.

[14]  Hyotaek Lim,et al.  A Strong User Authentication Framework for Cloud Computing , 2011, 2011 IEEE Asia-Pacific Services Computing Conference.

[15]  Mohammed Bakri Bashir,et al.  Multilevel Authentication Scheme for Cloud Computing , 2016 .

[16]  Manpreet Kaur,et al.  A Review of Cloud Computing Security Issues , 2015 .

[17]  M. Mrinalni Vaknishadh,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2012 .

[18]  Karandeep Kaur,et al.  A Review of Cloud Computing Service Models , 2016 .

[19]  Kai Hwang,et al.  Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.

[20]  Manas Ranjan Patra,et al.  Cloud Computing: Security Issues and Research Challenges , 2011 .

[21]  Atulay Mahajan,et al.  The Malicious Insiders Threat in the Cloud , 2015 .

[22]  S. Nalini,et al.  MLA scheme: Multi-level authentication for data in cloud using NTP-server and biometric , 2016, 2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC).

[23]  H. S. Fadewar,et al.  Authentication scheme for insecure networks in cloud computing , 2016, 2016 International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC).

[24]  Di Liu,et al.  A Research on Cloud Computing Security , 2013, 2013 International Conference on Information Technology and Applications.