Two Factor Vs Multi-factor, an Authentication Battle in Mobile Cloud Computing Environments

Mobile devices offer a convenient way of accessing our digital lives and many of those devices hold sensitive data that needs protecting. Mobile and wireless communications networks, combined with cloud computing as Mobile Cloud Computing (MCC), have emerged as a new way to provide a rich computational environment for mobile users, and business opportunities for cloud providers and network operators. It is the convenience of the cloud service and the ability to sync across multiple platforms/devices that has become the attraction to cloud computing. However, privacy, security and trust issues may still be a barrier that impedes the adoption of MCC by some undecided potential users. Those users still need to be convinced of the security of mobile devices, wireless networks and cloud computing. This paper is the result of a comprehensive review of one typical secure measure-authentication methodology research, spanning a period of five years from 2012--2017. MCC capabilities for sharing distributed resources is discussed. Authentication in MCC is divided in to two categories and the advantages of one category over its counterpart are presented, in the process of attempting to identify the most secure authentication scheme.

[1]  IBRAHIM GHAFIR,et al.  Botnet Command and Control Traffic Detection Challenges A Correlation based Solution , 2016 .

[2]  Li Yang,et al.  Entity authentication in a mobile-cloud environment , 2013, CSIIRW '13.

[3]  Bamidele Adebisi,et al.  Dynamic clustering and management of mobile wireless sensor networks , 2017, Comput. Networks.

[4]  Pethuru Raj,et al.  A proof of concept implementation of a mobile based authentication scheme without password table for cloud environment , 2015, 2015 IEEE International Advance Computing Conference (IACC).

[5]  Mohammad Hammoudeh,et al.  A Survey on Network Security Monitoring Systems , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).

[6]  Young-Sik Jeong,et al.  An efficient authentication system of smart device using multi factors in mobile cloud service architecture , 2015, Int. J. Commun. Syst..

[7]  Timothy Grance,et al.  Cloud Computing Synopsis and Recommendations , 2012 .

[8]  Qiang Ye,et al.  Message digest as authentication entity for mobile cloud computing , 2013, 2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC).

[9]  Sarah Mount,et al.  Map as a Service: A Framework for Visualising and Maximising Information Return from Multi-Modal Wireless Sensor Networks , 2015, Sensors.

[10]  Saudi Arabia Securing Mobile Cloud Using Finger Print Authentication , 2013 .

[11]  Bamidele Adebisi,et al.  A Wireless Sensor Network Border Monitoring System: Deployment Issues and Routing Protocols , 2017, IEEE Sensors Journal.

[12]  Jean-Marc Robert,et al.  Security and usability: the case of the user authentication methods , 2006, IHM '06.

[13]  Mohammad Hammoudeh,et al.  Social Engineering Attack Strategies and Defence Approaches , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).

[14]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[15]  Patrick Bours,et al.  A Mobile Phone Device as a Biometrics Authentication Method for an ATM Terminal , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.

[16]  Urs Hengartner,et al.  Itus: an implicit authentication framework for android , 2014, MobiCom.

[17]  Sebti Foufou,et al.  Cloud-Ready Biometric System for Mobile Security Access , 2012, NDT.

[18]  Ramlan Mahmod,et al.  Design and implementation of multi factor mechanism for secure authentication system , 2013 .

[19]  Paulo Lobato Correia,et al.  Smartphone-based palmprint recognition system , 2014, 2014 21st International Conference on Telecommunications (ICT).