Security challenges in the field of cloud computing
Subject Areas : information technologykiyarash mahmoodnahrani 1 * , mohsen heydarigojani 2 * , mohammad baghdadi 3 *
1 - Iran - Tehran - Islamic Azad University, West Tehran Branch
2 - ایران - تهران - دانشگاه آزاد اسلامی واحد تهران غرب
3 - ایران - تهران - دانشگاه آزاد اسلامی واحد تهران غرب
Keywords: Cloud computing, security challenges of cloud computing, authentication, access control, Cloud API,
Abstract :
With the growth and expansion of information technology, the issue of security in cloud networks has garnered significant attention. Today, security is considered one of the most critical challenges in cloud computing technology and is the subject of extensive research. The most important step in ensuring security is identifying potential threats and implementing the necessary security and protective measures. In this technology, the cloud serves as a tool for outsourcing services, enabling more specialized and efficient use of resources.
This article examines security challenges in the context of cloud computing and highlights that user authentication is a vital step in enhancing cloud security. Existing techniques for user authentication include traditional methods such as passwords and PINs, which rely on user knowledge. More secure methods, such as multi-factor authentication, combine multiple forms of verification, including passwords, smart cards, and biometrics. Additionally, methods like one-time passwords (OTPs) and keystroke dynamics analysis enhance security by generating time-based codes and analyzing typing patterns.
Techniques such as mobile trusted modules with hash functions and asymmetric cryptography, multi-factor authentication using fuzzy hash encryption algorithms, and keystroke dynamics analysis with k-means clustering algorithms are also employed. Moreover, single-use authentication with the OTP protocol and biometric authentication with static authentication systems have been introduced.
[1] Shafiq DA, Jhanjhi NZ, Abdullah A. Load balancing techniques in cloud computing environment: A review. Journal of King Saud University-Computer and Information Sciences. 2022 Jul 1;34(7):3910-33.