Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis

Cloud computing is a rapidly growing technology due to its highly flexible uses and applications. It also has other features such as simplicity, quick data access and reduced data storage costs. Consequently, it has been widely used by many organizations. This widespread use of cloud computing among...

Full description

Saved in:
Bibliographic Details
Main Authors: Eldow, Abdalla, Shakir, Mohanaad, Talab, Mohammed Ahmed, Muttar, Ahmed Kh., Tawafak, Ragad M.
Format: Article
Language:English
Published: JATIT 2019
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/26264/1/Literature%20Review%20Of%20Authentication%20Layer.pdf
http://umpir.ump.edu.my/id/eprint/26264/
http://www.jatit.org/volumes/ninetyseven12.php
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.ump.umpir.26264
record_format eprints
spelling my.ump.umpir.262642019-10-31T01:37:56Z http://umpir.ump.edu.my/id/eprint/26264/ Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis Eldow, Abdalla Shakir, Mohanaad Talab, Mohammed Ahmed Muttar, Ahmed Kh. Tawafak, Ragad M. QA75 Electronic computers. Computer science Cloud computing is a rapidly growing technology due to its highly flexible uses and applications. It also has other features such as simplicity, quick data access and reduced data storage costs. Consequently, it has been widely used by many organizations. This widespread use of cloud computing among organizations causes many security issues. Moreover, cloud computing layers are likely to be jeopardized by many security risks such as privileged user access, data location, data segregation, and data recovery. This paper aims to prepare an ample debate of a literature review-based studies that provided important insights to researchers in the scope of security cloud computing. The researcher applied a relevant set of keywords. These keywords are limited to the title, abstract and keywords search archives published between 2010 and June 2018. The database search returned a total of 308 publications. In addition, we conducted backward-forward searches from the reference lists of relevant, quality previous works on the security framework in public cloud computing studies. Then, the researcher filtered the publications to only full text access articles that were written in English only. Finally, this study obtained a many publication. The findings of this paper address many important points such as in this study is recommended to apply behavior recognition with password for improving authentication layer performance in cloud computing. This study finds most of current studies neglected the present of human factor in password-based authentication, and learnability in password-based authentication is highly weak. Despite this, very few studies have adopted the behavior recognition with password in public cloud. JATIT 2019 Article PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/26264/1/Literature%20Review%20Of%20Authentication%20Layer.pdf Eldow, Abdalla and Shakir, Mohanaad and Talab, Mohammed Ahmed and Muttar, Ahmed Kh. and Tawafak, Ragad M. (2019) Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis. Journal of Theoretical and Applied Information Technology, 97 (12). pp. 3448-3465. ISSN 1992-8645 (print); 817-3195 (online) http://www.jatit.org/volumes/ninetyseven12.php
institution Universiti Malaysia Pahang
building UMP Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Pahang
content_source UMP Institutional Repository
url_provider http://umpir.ump.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Eldow, Abdalla
Shakir, Mohanaad
Talab, Mohammed Ahmed
Muttar, Ahmed Kh.
Tawafak, Ragad M.
Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis
description Cloud computing is a rapidly growing technology due to its highly flexible uses and applications. It also has other features such as simplicity, quick data access and reduced data storage costs. Consequently, it has been widely used by many organizations. This widespread use of cloud computing among organizations causes many security issues. Moreover, cloud computing layers are likely to be jeopardized by many security risks such as privileged user access, data location, data segregation, and data recovery. This paper aims to prepare an ample debate of a literature review-based studies that provided important insights to researchers in the scope of security cloud computing. The researcher applied a relevant set of keywords. These keywords are limited to the title, abstract and keywords search archives published between 2010 and June 2018. The database search returned a total of 308 publications. In addition, we conducted backward-forward searches from the reference lists of relevant, quality previous works on the security framework in public cloud computing studies. Then, the researcher filtered the publications to only full text access articles that were written in English only. Finally, this study obtained a many publication. The findings of this paper address many important points such as in this study is recommended to apply behavior recognition with password for improving authentication layer performance in cloud computing. This study finds most of current studies neglected the present of human factor in password-based authentication, and learnability in password-based authentication is highly weak. Despite this, very few studies have adopted the behavior recognition with password in public cloud.
format Article
author Eldow, Abdalla
Shakir, Mohanaad
Talab, Mohammed Ahmed
Muttar, Ahmed Kh.
Tawafak, Ragad M.
author_facet Eldow, Abdalla
Shakir, Mohanaad
Talab, Mohammed Ahmed
Muttar, Ahmed Kh.
Tawafak, Ragad M.
author_sort Eldow, Abdalla
title Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis
title_short Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis
title_full Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis
title_fullStr Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis
title_full_unstemmed Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis
title_sort literature review of authentication layer for public cloud computing: a meta-analysis
publisher JATIT
publishDate 2019
url http://umpir.ump.edu.my/id/eprint/26264/1/Literature%20Review%20Of%20Authentication%20Layer.pdf
http://umpir.ump.edu.my/id/eprint/26264/
http://www.jatit.org/volumes/ninetyseven12.php
_version_ 1651866954853515264
score 13.18916