Back to Search Start Over

Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols

Authors :
Zeeshan Siddiqui
Omar Tayan
Muhammad Khurram Khan
Source :
IEEE Access, Vol 6, Pp 34527-34542 (2018)
Publication Year :
2018
Publisher :
IEEE, 2018.

Abstract

We live in a digital world where every detail of our information is being transferred from one smart device to another via cross-platform, third-party cloud services. Smart technologies, such as, smartphones are playing dynamic roles in order to successfully complete our daily routines and official tasks that require access to all types of critical data. Before the advent of these smart technologies, securing critical information was quite a challenge. However, after the advent and global adoption of such technologies, information security has become one of the primary and most fundamental task for security professionals. The integration of social media has made this task even more challenging to undertake successfully. To this day, there are plentiful studies in which numerous authentication and security techniques were proposed and developed for smartphone and cloud computing technologies. These studies have successfully addressed multiple authentication threats and other related issues in existing the smartphone and cloud computing technologies. However, to the best of our understanding and knowledge, these studies lack many aspects in terms of authentication attacks, logical authentication analysis, and the absence of authentication implementation scenarios. Due to these authentication anomalies and ambiguities, such studies cannot be fully considered for successful implementation. Therefore, in this paper, we have performed a comprehensive security analysis and review of various smartphone and cloud computing authentication frameworks and protocols to outline up-to-date authentication threats and issues in the literature. These authentication challenges are further summarized and presented in the form of different graphs to illustrate where the research is currently heading. Finally, based on those outcomes, we identify the latest and existing authentication uncertainties, threats, and other related issues to address future directions and open research issues in the domain of the smartphone- and cloud-computing authentication.

Details

Language :
English
ISSN :
21693536
Volume :
6
Database :
Directory of Open Access Journals
Journal :
IEEE Access
Publication Type :
Academic Journal
Accession number :
edsdoj.17b8b0240e0b4db2a813e91f43f1beb5
Document Type :
article
Full Text :
https://doi.org/10.1109/ACCESS.2018.2845299