User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Public cloud computing is one of the deployment services that can be accessed by all potential users through a website or program interface, at any time, from anywhere, and by using any device. Authentication layer works to allow the legitimate user only to access into the public cloud. It allows on...
Saved in:
Main Author: | |
---|---|
Format: | text::Thesis |
Language: | English |
Published: |
2023
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Public cloud computing is one of the deployment services that can be accessed by all potential users through a website or program interface, at any time, from anywhere, and by using any device. Authentication layer works to allow the legitimate user only to access into the public cloud. It allows one single instance of software to serve various clients. Password-based authentication is considered the cheapest and most popular and commonly used methods of computer authentication. However, illegitimate access is considered one of the most significant challenges in public cloud computing. In the same context, Many researchers have reported password leaks as a major issue. Multi-factors authentication (MFA) model, such as a password with a Smart card, SMS, and Biometric, is suggested by many researchers to avoid this problem. It is considered hard to break as compared to the use of password-based authentication alone. One of the most critical issues in MFA in public cloud computing is related to the accuracy of authenticating legitimate user access when facing stolen password attacks. In this thesis, the research gap related to the accuracy of authenticating a legitimate user is brought to light. The problem is in multi-factor authentication with public cloud computing, the performance of user authentication in password-based authentication needs to move from traditional security processes to intelligent security processes. This thesis proposes electronic personal synthesis behavior (EPSB) for improving the accuracy of user authentication in a public cloud. It aims to improve the accuracy of authentication in public cloud computing by dealing directly with behavior recognition, confidence range, and finally generated the electronic personal synthesis behavior (EPSB). Moreover, the learning process of the proposed algorithm for behavior recognition designed as a matching factor with a password during the authentication process. The evaluation criteria conducted according to the accuracy, acceptance and use. Firstly, an experiment by simulation on the stolen password conducted to examine the accuracy of authenticating a legitimate user according to the EPSB approach. Secondly, a questionnaire prepared to examine the acceptance and use of EPSB. Finally, the implemented algorithm tested by comparing the accuracy of the current authentication framework with and without an EPSB algorithm. The results of adopting EPSBalgorithm in authentication process lead to the mitigation of stolen password attacks’ effects and the shift from traditional authentication strategies to intelligent authentication operations. |
---|