Cloud computing login authentication redesign

No Thumbnail Available

Date

2014-02

Journal Title

Journal ISSN

Volume Title

Publisher

International Journal of Electronics and Information Engineering

Abstract

Trusted-security is a concern for cloud adoption by many enterprises. The work was to improve login security process at cloud ’ s user-end using biometric to replace secret code generation as step-2 authentication. System development life cycle-revolutionary waterfall method was adapted for the design process and verified the redesign using Delphi technique with security experts. The work alerts authorised user to block domain intrusion on phone at real time as phone is permanently interlinked to access server. On experiment, authorised user must submit cloud username and password on computer workstation as step-1 key. On submission, a text message is generated to a predefined biometric-compatible phone for user to scan bio-feature. As backdoor, if predefined biometric phone is temporarily lost; open the alternative link sent to authorised user e-mail account to capture and resend the scanned bio-feature to server as step-2 key for access privilege. Results indicated rigidity to prevent hacking via user-workstation. We recommended multi-nodal bio-scanning to reduce authentication failure rate and argued conclusively that this work improves user-end login security for cloud clients.

Description

Keywords

Access control, Biometric-phone, Cloud Computing, Security, 2-step Authentication

Citation

Osei, E. O., Hayfron-Acquah, J. B., & Kumasi, K. N. U. S. T. (2014). Cloud computing login authentication redesign. International Journal of Electronics and Information Engineering, 1(1), 1-8

Endorsement

Review

Supplemented By

Referenced By