Abstract:
The key objective of this project is to develop an effective authentication scheme
through which users can verify their identities on a mobile cloud computing platform
the system and then the data that and gain the authentication necessary to
concerns them. This report elaborates the various mechanisms considered and used
access
for the authentication scheme and the end result ol the research will be a
demonstration of how the authentication scheme can be used to secure data in a
mobile cloud computing environment while only giving access to users who can
authenticate themselves.
Authentication refers to the process of verifying the credibility and validity of a
certain entity and, in this context of this project, data authentication refers to the
process of verifying a user’s identity and, based off this verification, giving them
access to the data that they require or is linked to their credentials.
The project takes into consideration various different authentication schemes that
have been already been developed such as 2FA (2 Factor Authentication), Multi
Factor Authentication, OTP (One Time Password). In order to provide a high level of
security to users, the goal is to research a single effective authentication scheme
through which users can get access to all the mobile cloud computing services they
require.
Another significant benefit of this research is that, by removing unnecessary
complexities from the authentication process and making it revolve around a singular
key, authentication methods will require significantly less resources than they usually
do thereby improving the speed at which users can authenticate themselves