Two-Factor Authentication Scheme Using One Time Password in Cloud Computing.
Samar H. El-sherifRabab Farouk Abdel-KaderRawya Y. RizkPublished in: AISI (2018)
Keyphrases
- cloud computing
- authentication scheme
- user authentication
- computing resources
- smart card
- data center
- security analysis
- cloud computing environment
- big data
- data management
- information security
- secret key
- authentication protocol
- cloud computing platform
- service providers
- cloud storage
- cloud platform
- private cloud
- security issues
- computing infrastructure
- database
- databases
- data sets