Development Of Authentication Protocols When Accessing Cloud Services
Authors: V. Chaikovska , Aleksandr Oksiiuk
Affiliation: Taras Shevchenko National University of Kyiv
Keywords: authentication, cloud services, information security, protocols, secure connection
ABSTRACT. Cloud services are a rapidly developing industry, but rapid development is accompanied by many problems. One of such problems is unsafe authentication, which leads to the theft of confidential information. The problem of theft the access to the account is discussed all over the world. In this article, the authentication protocols that are being used, modified and developed by scientists and developers were reviewed. The presence of a large information base indicates that this problem is urgent and requires solutions.
Filimoshin V. Yu. Davletkireyeva l.z.: Secure authentication without using https. - International Journal of Open Information Technologies (2017) 7, 17-23.
Khazhieva A. S.: Principles of information protection in the cloud. - Achievements of science and education (2017) 6(19), 14-16.
Lozhnikov P., Sulavko A., Buraya E., Pisarenko V.: Authentication of Computer Users in Real-Time by Generating Bit Sequences Based on Keyboard Handwriting and Face Features. - questions of cyber security (2017) 3(21), 24-34
Steve Martinelli, Henry Nash, Brad Topol: Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone. - O'Reilly Media, 2016 – 130.
Vishniakou U.А., Ghondagh Saz М.М.: Authentification models in cloud computing for mobile applications with intellectual support of choice. – Doklady BGUIR. - Electron resource: https://www.bsuir.by/m/12_104571_1_112204.pdf#page=82, 2017.