Developing an Efficient Method of Multi-Factor Authentication in the Software Layer as a Cloud Computing Environment Service

Publish Year: 1398
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,542

This Paper With 13 Page And PDF and WORD Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

SETT01_081

تاریخ نمایه سازی: 31 تیر 1398

Abstract:

Cloud computing is a computational model based on the Internet that can provide users with scalable resources as a service on the platform of the Internet. Among the service models of cloud computing, Software as a Service is one of the service models that make it possible for users to run applications for presentation of important businesses and benefit of organizations and companies. However, adoption of SaaS confronts us with serious security risks, and sensitive information transfer is one of the drawbacks of this technology for many organizations that wish to utilize it. Therefore, security is more worrying than anything else in this service model, and security and privacy crises begin when information flows on the platform of the Internet. The need for examination of authentication methods will undoubtedly be the first step for confronting security threats. In this research, therefore, we sought to use various factors in order to increase trust in utilizing the services by studying the multi-factor authentication method. Therefore, this study focused on the multi-factor authentication method to develop the use of various factors in order to enhance the trust in using these services. The method presented in this paper is based on fingerprint-based two-factor authentication that uses the watermarking method not only to increase security but also to protect users privacy through information confidentiality and privatization. Furthermore, the AAA security server has been used for increasing user authentication power, the EAP-TTLS protocol employed in which plays a significant role in relating users to the server.

Keywords:

Authors

Zahra Jatan

Computer Department, Technical and Engineering Faculty, Central Tehran Branch, Islamic Azad University, Tehran, Iran

Alireza Hedayati

Assistant Professor in Computer Department, Technical and Engineering Faculty, Central Tehran Branch, Islamic Azad University, Tehran, Iran

Vahe Aghazarian

Assistant Professor in Computer Department, Technical and Engineering Faculty, Central Tehran Branch, Islamic Azad University, Tehran, Iran