Research Article
Secure Login Using Multi-Tier Authentication Schemes in Fog Computing
@ARTICLE{10.4108/eai.26-3-2018.154382, author={Awais Manzoor and Abdul Wahid and Munam Ali Shah and Adnan Akhunzada and Faisal Fayyaz Qureshi}, title={Secure Login Using Multi-Tier Authentication Schemes in Fog Computing}, journal={EAI Endorsed Transactions on Internet of Things}, volume={3}, number={11}, publisher={EAI}, journal_a={IOT}, year={2017}, month={7}, keywords={Authentication, Multi-tier Authentications, Cloud computing, Multifactor authentications, cloud security.}, doi={10.4108/eai.26-3-2018.154382} }
- Awais Manzoor
Abdul Wahid
Munam Ali Shah
Adnan Akhunzada
Faisal Fayyaz Qureshi
Year: 2017
Secure Login Using Multi-Tier Authentication Schemes in Fog Computing
IOT
EAI
DOI: 10.4108/eai.26-3-2018.154382
Abstract
Security threats are major barriers in authentication process in Fog Computing. Identification of a user through single signon process like simple password-based authentications are no longer considered secure. Different multi-tier authentication schemes exist in literature that overcome the weakness of single sign-on. This paper surveys state-of-the-art multi-tier authentication techniques, their vulnerabilities, security threats and their solution proposed over the period of 2012-2016. We compare the performance of existing multi-tier authentication schemes on three parameters, i.e., cost, usability and level of security. Multi-tier authentication schemes have been categorized into groups according to the factors involved in the authentication process. Lastly, we aim to provide an easy and concise view of the underlying authentication model adapted by each approach
Copyright © 2017 Awais Manzoor et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.