Secure Login Using Multi-Tier Authentication Schemes in Fog Computing

Authors

DOI:

https://doi.org/10.4108/eai.26-3-2018.154382

Keywords:

Authentication, Multi-tier Authentications, Cloud computing, Multifactor authentications, cloud security

Abstract

Security threats are major barriers in authentication process in Fog Computing. Identification of a user through single signon process like simple password-based authentications are no longer considered secure. Different multi-tier authentication schemes exist in literature that overcome the weakness of single sign-on. This paper surveys state-of-the-art multi-tier authentication techniques, their vulnerabilities, security threats and their solution proposed over the period of 2012-2016. We compare the performance of existing multi-tier authentication schemes on three parameters, i.e., cost, usability and level of security. Multi-tier authentication schemes have been categorized into groups according to the factors involved in the authentication process. Lastly, we aim to provide an easy and concise view of the underlying authentication model adapted by each approach

Downloads

Download data is not yet available.
<br data-mce-bogus="1"> <br data-mce-bogus="1">

Downloads

Published

26-07-2017

How to Cite

[1]
A. . Manzoor, A. . Wahid, M. . Ali Shah, A. . Akhunzada, and F. . Fayyaz Qureshi, “Secure Login Using Multi-Tier Authentication Schemes in Fog Computing”, EAI Endorsed Trans IoT, vol. 3, no. 11, p. e5, Jul. 2017.