The two secured factors of authentication
Other Title(s)
اثنان من العوامل الضامنة لعملية المصادقة في الحوسبة الحسابية
Joint Authors
Hamad, Hatim M.
Abu Dalal, Walid Abd al-Malik
Source
IUG Journal of Natural Studies
Issue
Vol. 24, Issue 1 (30 Jun. 2016), pp.1-13, 13 p.
Publisher
The Islamic University-Gaza Deanship of Research and Graduate Affairs
Publication Date
2016-06-30
Country of Publication
Palestine (Gaza Strip)
No. of Pages
13
Main Subjects
Information Technology and Computer Science
Topics
Abstract AR
One of the popular challenges that faces the Cloud Computing is the authentication problem.
Authentication is a mechanism to establish proof of identities to get access of information in the system.
There are several solutions to overcome this issue that it can be gathered in three authentication mechanisms which lead to a multifactorial authentication schema.
The multi factor is proposed in this paper confirms the user's identity without sending it to the cloud server, which will gain our solution more security and fast response over other solutions that depend on sending the user identity to the server to be authenticated.
The User's credentials have never exchanged with the server, it is only saved in the user's mind.
We present an efficient authentication schema which based on two authentication factors, the first is the password-based authentication, which is processed in the user's machine, and the second is the biometric-based authentication which adds more secure factors to the authentication process.
We use the Elgamal Elliptic Curve Cryptosystem and the symmetric encryption to overcome the security threads on the authentication process.
Furthermore; we use the 3D face image as a second challenge response factor in our proposed algorithm.
In addition, to save the bandwidth and computation, we use a mobile agent to pass the first factor of the authentication code to be executed in the client machine, and let the second factor to be executed in the cloud server.
Abstract EN
One of the popular challenges that faces the Cloud Computing is the authentication problem.
Authentication is a mechanism to establish proof of identities to get access of information in the system.
There are several solutions to overcome this issue that it can be gathered in three authentication mechanisms which lead to a multifactorial authentication schema.
The multi factor is proposed in this paper confirms the user's identity without sending it to the cloud server, which will gain our solution more security and fast response over other solutions that depend on sending the user identity to the server to be authenticated.
The User's credentials have never exchanged with the server, it is only saved in the user's mind.
We present an efficient authentication schema which based on two authentication factors, the first is the password-based authentication, which is processed in the user's machine, and the second is the biometric-based authentication which adds more secure factors to the authentication process.
We use the Elgamal Elliptic Curve Cryptosystem and the symmetric encryption to overcome the security threads on the authentication process.
Furthermore; we use the 3D face image as a second challenge response factor in our proposed algorithm.
In addition, to save the bandwidth and computation, we use a mobile agent to pass the first factor of the authentication code to be executed in the client machine, and let the second factor to be executed in the cloud server.
American Psychological Association (APA)
Hamad, Hatim M.& Abu Dalal, Walid Abd al-Malik. 2016. The two secured factors of authentication. IUG Journal of Natural Studies،Vol. 24, no. 1, pp.1-13.
https://search.emarefa.net/detail/BIM-668449
Modern Language Association (MLA)
Hamad, Hatim M.& Abu Dalal, Walid Abd al-Malik. The two secured factors of authentication. IUG Journal of Natural Studies Vol. 24, no. 1 (2016), pp.1-13.
https://search.emarefa.net/detail/BIM-668449
American Medical Association (AMA)
Hamad, Hatim M.& Abu Dalal, Walid Abd al-Malik. The two secured factors of authentication. IUG Journal of Natural Studies. 2016. Vol. 24, no. 1, pp.1-13.
https://search.emarefa.net/detail/BIM-668449
Data Type
Journal Articles
Language
English
Notes
Includes bibliographical references : p. 11-13
Record ID
BIM-668449