Literature review of authentication layer for public cloud computing: A meta-analysis

Cloud computing is a8rapidly growing technology due to its8highly flexible uses and applications. It also has other features such as8simplicity, quick data access and reduced8data storage costs. Consequently, it has been widely used8by many organizations. This widespread use of cloud computing among...

Full description

Saved in:
Bibliographic Details
Main Authors: Eldow A., Shakir M., Talab M.A., Muttar A.K., Tawafak R.M.
Other Authors: 57195379749
Format: Article
Published: Little Lion Scientific 2023
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-24621
record_format dspace
spelling my.uniten.dspace-246212023-05-29T15:25:13Z Literature review of authentication layer for public cloud computing: A meta-analysis Eldow A. Shakir M. Talab M.A. Muttar A.K. Tawafak R.M. 57195379749 57057236900 56638495600 56958435300 57201906735 Cloud computing is a8rapidly growing technology due to its8highly flexible uses and applications. It also has other features such as8simplicity, quick data access and reduced8data storage costs. Consequently, it has been widely used8by many organizations. This widespread use of cloud computing among8organizations causes many security issues. Moreover, cloud computing layers8are likely to be jeopardized8by many security risks such as privileged8user access, data location, data segregation, and data8recovery. This paper aims to prepare8an ample debate of a literature review-based studies that provided important insights to researchers in the scope of security cloud computing. The researcher applied a relevant8set of keywords. These keywords are limited8to the title, abstract and keywords search archives published between 2010 and June 2018. The database search returned a total of 308 publications. In addition, we conducted backward-forward searches from the reference lists of relevant, quality previous works on the security framework in public cloud computing studies. Then, the researcher filtered the publications to only full text access articles that were written in English only. Finally, this study obtained a many publication. The findings of this paper address many important points such as in this study is recommended to apply behavior recognition with password for improving authentication layer performance in cloud computing. This study finds most of current studies neglected the present of human factor in password-based authentication, and learnability in password-based authentication is highly weak. Despite this, very few studies have adopted the behavior recognition with password in public cloud. � 2005 � ongoing JATIT & LLS. Final 2023-05-29T07:25:12Z 2023-05-29T07:25:12Z 2019 Article 2-s2.0-85069629241 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85069629241&partnerID=40&md5=85e3dc819d14ffeaa82a8b14a2519d8c https://irepository.uniten.edu.my/handle/123456789/24621 97 12 3448 3465 Little Lion Scientific Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
description Cloud computing is a8rapidly growing technology due to its8highly flexible uses and applications. It also has other features such as8simplicity, quick data access and reduced8data storage costs. Consequently, it has been widely used8by many organizations. This widespread use of cloud computing among8organizations causes many security issues. Moreover, cloud computing layers8are likely to be jeopardized8by many security risks such as privileged8user access, data location, data segregation, and data8recovery. This paper aims to prepare8an ample debate of a literature review-based studies that provided important insights to researchers in the scope of security cloud computing. The researcher applied a relevant8set of keywords. These keywords are limited8to the title, abstract and keywords search archives published between 2010 and June 2018. The database search returned a total of 308 publications. In addition, we conducted backward-forward searches from the reference lists of relevant, quality previous works on the security framework in public cloud computing studies. Then, the researcher filtered the publications to only full text access articles that were written in English only. Finally, this study obtained a many publication. The findings of this paper address many important points such as in this study is recommended to apply behavior recognition with password for improving authentication layer performance in cloud computing. This study finds most of current studies neglected the present of human factor in password-based authentication, and learnability in password-based authentication is highly weak. Despite this, very few studies have adopted the behavior recognition with password in public cloud. � 2005 � ongoing JATIT & LLS.
author2 57195379749
author_facet 57195379749
Eldow A.
Shakir M.
Talab M.A.
Muttar A.K.
Tawafak R.M.
format Article
author Eldow A.
Shakir M.
Talab M.A.
Muttar A.K.
Tawafak R.M.
spellingShingle Eldow A.
Shakir M.
Talab M.A.
Muttar A.K.
Tawafak R.M.
Literature review of authentication layer for public cloud computing: A meta-analysis
author_sort Eldow A.
title Literature review of authentication layer for public cloud computing: A meta-analysis
title_short Literature review of authentication layer for public cloud computing: A meta-analysis
title_full Literature review of authentication layer for public cloud computing: A meta-analysis
title_fullStr Literature review of authentication layer for public cloud computing: A meta-analysis
title_full_unstemmed Literature review of authentication layer for public cloud computing: A meta-analysis
title_sort literature review of authentication layer for public cloud computing: a meta-analysis
publisher Little Lion Scientific
publishDate 2023
_version_ 1806424224351387648
score 13.209306