OVERALL REVIEW OF THE AUTHENTICATION PROBLEM IN THE CLOUD SERVICES

Authors: Oksiiuk O., Vialkova V. Chaikovska V., Shestak Y
Affiliation: Taras Shevchenko National University of Kyiv, Kyiv, Ukraine

Category:

Keywords: authentication, protocols, confidential information, secure connection, information security, cloud services, cybersecurity, threats, data storage, legislation, authentication algorithms, data protection
ABSTRACT. This article presents the secure authentication in cloud technologies and determining vulnerabilities in the algorithms. The research performs the development direction of the authentication protocols and their analysis. It is needed to identify the legislation and standards in the research field. After that, the threats investigation is the most crucial part, as we need to protect all vulnerable elements in the authentication process. The importance of such research is the rapid growth of the cloud technology industry. The result is offering new methods in the authentication algorithms

References:

Cloud Standards Customer Council. Security for Cloud Computing Ten Steps to Ensure Success Version 2.0. – 2015. – 35p
Filimoshin V. Yu. Davletkireyeva l.z.: Secure authentication without using https. - International Journal of Open Information Technologies (2017) 7, 17-23.
Hickey K. Dark cloud: Study finds security risks in virtualization / Kathleen Hickey // Technology, Tools and Tactics for Public Sector IT. - 2010 - № 3 — p. 3-5
Khazhieva A. S.: Principles of information protection in the cloud. - Achievements of science and education (2017) 6(19), 14-16
Lozhnikov P., Sulavko A., Buraya E., Pisarenko V.: Authentication of Computer Users in Real- Time by Generating Bit Sequences Based on Keyboard Handwriting and Face Features. - questions of cyber security (2017) 3(21), 24-34
Peter Mell, Timothy Grance. The NIST Definition of Cloud Computing / National Institute of Standards and Technology / Rebecca M. Blank. – Gaithersburg: NIST, 2011. – 286 p
Vishniakou U.А., Ghondagh Saz М.М.: Authentification models in cloud computing for mobile applications with intellectual support of choice. – Doklady BGUIR. - Electronic resource: https://www.bsuir.by/m/12_104571_1_112204.pdf#page=82, 2017.
Winkler J.R. Securing the Cloud. 1st Edition / Vic (J.R.) Winkler. - US : Syngress, 2011. - 314p.
Cloud Standards Customer Council. Security for Cloud Computing Ten Steps to En-sure Success Version 2.0. – 2015. – 35p.
Filimoshin V. Yu. Davletkireyeva l.z.: Secure authentication without using https. - International Journal of Open Information Technologies (2017) 7, 17-23
Hickey K. Dark cloud: Study finds security risks in virtualization / Kathleen Hickey // Technology, Tools and Tactics for Public Sector IT. - 2010 - № 3 — p. 3-5.
Khazhieva A. S.: Principles of information protection in the cloud. - Achievements of science and education (2017) 6(19), 14-16.
Lozhnikov P., Sulavko A., Buraya E., Pisarenko V.: Authentication of Computer Users in Real- Time by Generating Bit Sequences Based on Keyboard Handwriting and Face Features. - questions of cyber security (2017) 3(21), 24-34
Peter Mell, Timothy Grance. The NIST Definition of Cloud Computing / National In-stitute of Standards and Technology / Rebecca M. Blank. – Gaithersburg: NIST, 2011. – 286
Vishniakou U.А., Ghondagh Saz М.М.: Authentification models in cloud computing for mobile applications with intellectual support of choice. – Doklady BGUIR. - Elec-tronic resource: https://www.bsuir.by/m/12_104571_1_112204.pdf#page=82, 2017.
Winkler J.R. Securing the Cloud. 1st Edition / Vic (J.R.) Winkler. - US : Syngress, 2011. - 314p
Douglas Paris-White. Five features of information security every cloud platform should provide. - IBM Cloud Blog, February 6, 2018 – [access: https://www.ibm.com/blogs/bluemix/2018/02/five-fundamentals-cloud-security/]
Eric O'Neill. Why the future of cybersecurity is in the cloud? - Eric O'Neill. - 27 April 2018 – [access: https://www.cloudcomputing-news.net/news/2018/apr/27/why-future-cybersecuritycloud/]
ICT. Online Authentication Threats and Attacks. - ICT.govt.nz. Authentication standards - 21/09/2016
Krutz, Ronald L. and Russell Dean Vines. "Cloud Computing Security Architecture." Cloud Security: A Comprehensive Guide to Secure Cloud Computing. - Indianapolis, IN: Wiley, 2010. - 179p.
Ponemon Institute’s 2017 Cost of Data Breach Study: Global Overview. – IBM Security, June 2017 – 34 p.