Acknowledgement
We acknowledge the labs and library section of Panipat Institue of Engineering and Technology, Samalkha, Panipat and MMU, Mullana for the access of the resources.
References
- NIST definition on cloud computing accessed from nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf
- James Broberg, Andrzej Goscinski, Rajkumar Buyya, Cloud Computing: Principles and Paradigms, Wiley, Part VI, 2013.
- Judith Hurwitz, Robin Bloor, and Marcia Kaufman, Cloud Computing For Dummies, Wiley Publishing Inc.,Indiana, 2010.
- Stallings W., Cryptography and Network Security, Principles and Practices, Fourth Edition, Pearson Education.
- Mark Stamp, Information Security Principles and Practice, Wiley India Pvt. Ltd., pp. 215-220, 2006.
- RightScale 2015 State of the Cloud Report, p. 20.
- RightScale 2016 State of the Cloud Report, p. 19.
- RightScale 2017 State of the Cloud Report, p. 16.
- RightScale 2018 State of the Cloud Report, p. 21
- RightScale 2019 State of the Cloud Report, p. 21.
- Flexera 2020 State of the Cloud Report, p. 37
- Flexera 2021 State of the Cloud Report, p. 41
- Flexera 2022 State of the Cloud Report, p. 44
- David Chou, "Strong User Authentication on the Web," The Architecture Journal, August 2008 as available on http://msdn.microsoft.com/en-us/library/cc838351.aspx
- Durbin S., "Information security without boundaries," Network Security, Feb., 2011.
- Bertino E., Paci F., Ferrini R., "Privacy preserving Digital Identity Management for Cloud Computing," Bulletin of the IEEE Computer Society Technical Committee on Data Engineering, 2009.
- Vishal Paranjape, Vimmi Pandey, "An Improved Authentication Technique with OTP in CloudComputing," International Journal of Scientific Research in Computer Science and Engineering, Vol-1, Issue-3, pp. 22-26, June 2013.
- Kim J. and Hong S., "A Consolidated Authentication Model in Cloud Computing Environments," International Journal of Multimedia and Ubiquitous Engineering, Vol. 7, No. 3, July, 2012
- Moghaddam F. F., Karimi O., Hajivali M., "Applying a Single Sign-On Algorithm Based on Cloud Computing Concepts for SaaS Applications," IEEE 11th Malaysia International Conference on Communications, November 2013, Kuala Lumpur, Malaysia
- Farhatullah M., "ALP: An authentication and leak prediction model for Cloud Computing privacy," 3rd IEEE International Advance Computing Conference (IACC), 2013
- Chaimae E., Rahal R., Abdellatif E. A., "ECC Certificate for Authentication in Cloud-Based RFID," 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech), May, 2016
- Msahli M., Hammi M. T., Serhrouchni A., Safe box cloud authentication using TLS extension, International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), August, 2015
- R. Amin, T. Gaber, G. ElTaweel, and A. E. Hassanien, "Biometric and traditional mobile authentication techniques: Overviews and open issues," in Bio-Inspiring Cyber Security and Cloud Services: Trends and Innovations. Berlin, Germany: Springer, 2014, pp. 423-446
- S. Furnell, N. Clarke, and S. Karatzouni, "Beyond the PIN: Enhancing user authentication for mobile devices," Comput. Fraud Security, vol. 2008, no. 8, pp. 12-17, 2008. https://doi.org/10.1016/S1361-3723(08)70127-1
- Y. Yang, G. D. Clark, J. Lindqvist, and A. Oulasvirta, "Free-form gesture authentication in the wild," in Proc. CHI Conf. Human Factors Comput. Syst., 2016, pp. 3722-3735.
- Z. Zhao, G.-J. Ahn, and H. Hu, "Picture gesture authentication: Empirical analysis, automated attacks, and scheme evaluation," ACM Trans. Inf. System Security, vol. 17, no. 4, p. 14, 2015.
- D. Nyang et al., "Two-thumbs-up: Physical protection for pin entry secure against recording attacks," Computer Security, vol. 78, pp. 1-15, Sep. 2018 https://doi.org/10.1016/j.cose.2018.05.012
- Deutschmann I., Nordstrom P., Nilsson L., "Continuous Authentication Using Behavioral Biometrics," IT Professional, Vol 15, Issue 4, pp. 12 - 15, 2013. https://doi.org/10.1109/MITP.2013.50
- P. S. Teh, A. B. J. Teoh, and S. Yue, "A survey of keystroke dynamics biometrics," The Scientific World J., vol. 2013, Nov. 2013, Art. no. 408280.
- J. Wu and Z. Chen, "An implicit identity authentication system considering changes of gesture based on keystroke behaviors," Int. Journal of Distributed Sensor Networks, vol. 11, no. 6, pp. 470274:1-470274:16, 2015. https://doi.org/10.1155/2015/470274
- M. N. Aman, M. H. Basheer, and B. Sikdar, "Two-factor authentication for IoT with location information," IEEE Internet Things J., vol. 6, no. 2, pp. 3335-3351, Apr. 2019. https://doi.org/10.1109/JIOT.2018.2882610
- Y. Liang, S. Samtani, B. Guo, and Z. Yu, "Behavioral Biometrics for Continuous Authentication in the Internet-of-Things Era: An Artificial Intelligence Perspective," IEEE Internet Things J., vol. 7, no. 9, pp. 9128-9143, 2020, doi: 10.1109/JIOT.2020.3004077.
- G. Bansal, N. Naren, V. Chamola, B. Sikdar, N. Kumar, and M. Guizani, "Lightweight Mutual Authentication Protocol for V2G Using Physical Unclonable Function," IEEE Trans. Veh. Technol., vol. 69, no. 7, pp. 7234-7246, 2020, doi: 10.1109/TVT.2020.2976960.
- R. Shashidhara, S. K. Nayak, A. K. Das, and Y. Park, "On the Design of Lightweight and Secure Mutual Authentication System for Global Roaming in Resource-Limited Mobility Networks," IEEE Access, vol. 9, pp. 12879-12895, 2021, doi: 10.1109/ACCESS.2021.3050402.
- R. Ferrero, F. Gandino, B. Montrucchio, M. Rebaudengo, A. Velasco, and I. Benkhelifa, "On gait recognition with smart phone accelerometer," in Proceedings of 4th Mediterranean Conf. Embedded Comput. (MECO), 2015, pp. 368-373.
- A. L. Fantana, S. Ramachandran, C. H. Schunck, and M. Talamo, "Movement based biometric authentication with smartphones," in Proc. Int. Carnahan Conf. Security Technol. (ICCST), 2015, pp. 235-239
- Schneier B., Applied Cryptography, John Wiley & Sons (Asia) Pte Ltd, ISBN 9971-51-348-X.
- Insaf Adjabi, Abdeldjalil Ouahabi, Amir Benzaoui, Abdelmalik Taleb-Ahmed, Past, Present, and Future of Face Recognition: A Review, Electronics 2020, 9, 1188; doi:10.3390/electronics9081188
- Akshay A. Pawle, Vrushsen P. Pawar, "Face Recognition System (FRS) on Cloud Computing for User Authentication," International Journal of Soft Computing and Engineering (IJSCE), Volume-3, Issue-4, September 2013.
- Hua-Hong Zhu, Qian-Hua He, Hua-Hong Zhu, Hong Tang, Wei-Hua Cao, Voiceprint-Biometric Template Design and Authentication Based on Cloud Computing Security, IEEE International Conference on Cloud and Service Computing, 2011
- Chen Wang, Yan Wang, Yingying Chen, Hongbo Liu, Jian Liu, User authentication on mobile devices: Approaches, threats and trends, Computer Networks, Volume 170, 2020, 107118, ISSN 1389-1286, https://doi.org/10.1016/j.comnet.2020.107118.
- Information Classification theory as available on http://en.wikipedia.org/wiki/Classified_information
- Suri P. R., Deora S. S., "A cipher based on 3D Array Block Rotation," International Journal of Computer Science and Network Security, Vol. 10, No. 2, pp. 186-191, Feb., 2010.
- Suri P. R., Deora S. S., "3D Array Block Rotation cipher: an improvement using shift," Global Journal of Computer Science and Technology, Vol. 11, Issue 19, pp. 17-23, Version 1.0, November, 2011.
- Mandylion Research Labs accessed from http://www.mandylionlabs.com/index15.htm] on March, 2017.