We found a match
Your institution may have access to this item. Find your institution then sign in to continue.
- Title
Secure Data Sharing in Cloud Computing: A Comprehensive Survey of Two-Factor Authentication and Cryptographic Solutions.
- Authors
Gadde, Swetha; Rao, Gutta Srinivasa; Veesam, Venkata Srinivasu; Yarlagadda, Madhulika; Patibandla, R. S. M. Lakshmi
- Abstract
Cloud computing has emerged as a pivotal trend across both commercial and academic sectors, offering substantial storage capabilities to service providers and end-users. However, the security of data within cloud environments remains a paramount concern, primarily due to insufficient access controls. This concern is addressed herein through a systematic literature review, which underscores the shared responsibility model, the ubiquitous nature of data access, and the associated breach risks. The importance of enforcing rigorous security protocols to maintain data integrity, confidentiality, and availability is emphasized, as these are vital to stakeholders relying on cloud-based services. The current work presents an analytical review of two-factor authentication (2FA) and cryptographic measures, advocating for their combined implementation to bolster the security frameworks of cloud systems. The survey meticulously examines existing research on cloud computing vulnerabilities, security mechanisms, and the underlying challenges. It is posited that ongoing enhancements and innovations in security practices are critical for countering evolving threats and safeguarding data in an increasingly digital landscape. An exhaustive evaluation of the latest advancements in cryptography is conducted, aiming to ensure secure and authenticated access control for outsourced and encrypted cloud data across diverse user groups. The findings herein serve as a foundation for researchers to refine and develop robust cloud data storage systems. The survey underscores the need for the creation of advanced encryption algorithms, authentication protocols, and intrusion detection systems. Such developments are instrumental in mitigating risks, establishing trust, and preserving the confidentiality and integrity of data stored in cloud infrastructures.
- Subjects
CLOUD computing; INFORMATION sharing; ACCESS control; MULTI-factor authentication; CLOUD storage; DATA security; COMMUNICATION infrastructure; DATA warehousing
- Publication
Ingénierie des Systèmes d'Information, 2023, Vol 28, Issue 6, p1467
- ISSN
1633-1311
- Publication type
Article
- DOI
10.18280/isi.280604