The two secured factors of authentication

Other Title(s)

اثنان من العوامل الضامنة لعملية المصادقة في الحوسبة الحسابية

Joint Authors

Hamad, Hatim M.
Abu Dalal, Walid Abd al-Malik

Source

IUG Journal of Natural Studies

Issue

Vol. 24, Issue 1 (30 Jun. 2016), pp.1-13, 13 p.

Publisher

The Islamic University-Gaza Deanship of Research and Graduate Affairs

Publication Date

2016-06-30

Country of Publication

Palestine (Gaza Strip)

No. of Pages

13

Main Subjects

Information Technology and Computer Science

Topics

Abstract AR

One of the popular challenges that faces the Cloud Computing is the authentication problem.

Authentication is a mechanism to establish proof of identities to get access of information in the system.

There are several solutions to overcome this issue that it can be gathered in three authentication mechanisms which lead to a multifactorial authentication schema.

The multi factor is proposed in this paper confirms the user's identity without sending it to the cloud server, which will gain our solution more security and fast response over other solutions that depend on sending the user identity to the server to be authenticated.

The User's credentials have never exchanged with the server, it is only saved in the user's mind.

We present an efficient authentication schema which based on two authentication factors, the first is the password-based authentication, which is processed in the user's machine, and the second is the biometric-based authentication which adds more secure factors to the authentication process.

We use the Elgamal Elliptic Curve Cryptosystem and the symmetric encryption to overcome the security threads on the authentication process.

Furthermore; we use the 3D face image as a second challenge response factor in our proposed algorithm.

In addition, to save the bandwidth and computation, we use a mobile agent to pass the first factor of the authentication code to be executed in the client machine, and let the second factor to be executed in the cloud server.

Abstract EN

One of the popular challenges that faces the Cloud Computing is the authentication problem.

Authentication is a mechanism to establish proof of identities to get access of information in the system.

There are several solutions to overcome this issue that it can be gathered in three authentication mechanisms which lead to a multifactorial authentication schema.

The multi factor is proposed in this paper confirms the user's identity without sending it to the cloud server, which will gain our solution more security and fast response over other solutions that depend on sending the user identity to the server to be authenticated.

The User's credentials have never exchanged with the server, it is only saved in the user's mind.

We present an efficient authentication schema which based on two authentication factors, the first is the password-based authentication, which is processed in the user's machine, and the second is the biometric-based authentication which adds more secure factors to the authentication process.

We use the Elgamal Elliptic Curve Cryptosystem and the symmetric encryption to overcome the security threads on the authentication process.

Furthermore; we use the 3D face image as a second challenge response factor in our proposed algorithm.

In addition, to save the bandwidth and computation, we use a mobile agent to pass the first factor of the authentication code to be executed in the client machine, and let the second factor to be executed in the cloud server.

American Psychological Association (APA)

Hamad, Hatim M.& Abu Dalal, Walid Abd al-Malik. 2016. The two secured factors of authentication. IUG Journal of Natural Studies،Vol. 24, no. 1, pp.1-13.
https://search.emarefa.net/detail/BIM-668449

Modern Language Association (MLA)

Hamad, Hatim M.& Abu Dalal, Walid Abd al-Malik. The two secured factors of authentication. IUG Journal of Natural Studies Vol. 24, no. 1 (2016), pp.1-13.
https://search.emarefa.net/detail/BIM-668449

American Medical Association (AMA)

Hamad, Hatim M.& Abu Dalal, Walid Abd al-Malik. The two secured factors of authentication. IUG Journal of Natural Studies. 2016. Vol. 24, no. 1, pp.1-13.
https://search.emarefa.net/detail/BIM-668449

Data Type

Journal Articles

Language

English

Notes

Includes bibliographical references : p. 11-13

Record ID

BIM-668449