{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T19:14:41Z","timestamp":1768418081363,"version":"3.49.0"},"reference-count":28,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4,1]]},"abstract":"<p>The expansion of Cloud computing is influencing various domains such as education, the banking sector, industries, government, health informatics, and individuals. The characteristics of an easy interface, on-demand access, scalability, and low infrastructure investment have to lead to the fast adaptation of Cloud computing based upon their needs. Despite the advantages, Cloud computing is open to more security risks and attacks especially in terms of communication due to the lack of secure authentication and privacy. In this article is presented a novel hash-based multifactor secure mutual authentication scheme that includes mathematical hashing properties, certificates, nonce values, traditional user ids, and password mechanisms that resist MITM attacks, replay attacks, and forgery attacks. We implemented our proposed method in the Microsoft Azure cloud and the results are evaluated. The security analysis is done by using the Scyther tool and with a formal analysis by using GNY belief logic. The results indicate the proposed scheme is capable of providing strong secure authentication.<\/p>","DOI":"10.4018\/ijcac.2020040104","type":"journal-article","created":{"date-parts":[[2020,2,14]],"date-time":"2020-02-14T11:28:18Z","timestamp":1581679698000},"page":"56-76","source":"Crossref","is-referenced-by-count":13,"title":["Multi Factor Two-way Hash-Based Authentication in Cloud Computing"],"prefix":"10.4018","volume":"10","author":[{"family":"K. DeviPriya","sequence":"first","affiliation":[{"name":"Aditya Engineering College, Andhra Pradesh, India"}]},{"given":"Sumalatha","family":"Lingamgunta","sequence":"additional","affiliation":[{"name":"University College of Engineering, Kakinada, India"}]}],"member":"2432","reference":[{"key":"IJCAC.2020040104-0","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2003.1261225"},{"key":"IJCAC.2020040104-1","doi-asserted-by":"publisher","DOI":"10.1109\/CIMSim.2013.25"},{"key":"IJCAC.2020040104-2","doi-asserted-by":"publisher","DOI":"10.4018\/IJDWM.2016010103"},{"key":"IJCAC.2020040104-3","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00110-4"},{"issue":"11","key":"IJCAC.2020040104-4","first-page":"2519","article-title":"Stolen-verifier attack on two new strong-password authentication protocols.","volume":"85","author":"C. M.Chen","year":"2002","journal-title":"IEICE Transactions on Communications"},{"key":"IJCAC.2020040104-5","doi-asserted-by":"publisher","DOI":"10.1109\/APSCC.2011.14"},{"key":"IJCAC.2020040104-6","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2013.6742784"},{"key":"IJCAC.2020040104-7","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2010.5628061"},{"issue":"2","key":"IJCAC.2020040104-8","article-title":"Analysis and verification of a key agreement protocol over cloud computing using scyther tool.","volume":"2","author":"A.Elbaz","year":"2014","journal-title":"International Journal of Distributed and Cloud Computing"},{"key":"IJCAC.2020040104-9","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2010.45"},{"key":"IJCAC.2020040104-10","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1990.63854"},{"key":"IJCAC.2020040104-11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.08.016"},{"key":"IJCAC.2020040104-12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEET.2012.6203873"},{"issue":"4","key":"IJCAC.2020040104-13","article-title":"A view of cloud computing.","volume":"53","year":"2010","journal-title":"Communications of the ACM"},{"key":"IJCAC.2020040104-14","unstructured":"Kalpana, P. (2012). Data Security in Cloud Computing using RSA Algorithm International Journal of Research in Computer and Communication technology. IJRCCT, 1(4)."},{"key":"IJCAC.2020040104-15","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.12.006"},{"key":"IJCAC.2020040104-16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWAMTIP.2014.7073400"},{"key":"IJCAC.2020040104-17","doi-asserted-by":"publisher","DOI":"10.7763\/JACN.2013.V1.47"},{"key":"IJCAC.2020040104-18","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-015-0046-4"},{"key":"IJCAC.2020040104-19","doi-asserted-by":"publisher","DOI":"10.4018\/IJGC.2018070101"},{"key":"IJCAC.2020040104-20","unstructured":"Raja Rajani, S., Ghorpade, V., & Dhange, M. (2016). Multi-factor Authentication as a Service for Cloud Data Security."},{"key":"IJCAC.2020040104-21","unstructured":"Saad, M. I. M., Jalil, K. A., & Manaf, M. (2006). Preserving user privacy with anonymous authentication in cloud computing."},{"key":"IJCAC.2020040104-22","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00709-0"},{"key":"IJCAC.2020040104-23","doi-asserted-by":"publisher","DOI":"10.3390\/app9132746"},{"key":"IJCAC.2020040104-24","doi-asserted-by":"publisher","DOI":"10.5120\/19873-1864"},{"issue":"11","key":"IJCAC.2020040104-25","first-page":"200","article-title":"Security challenges of cloud computing.","volume":"3","author":"A.Thilakarathne","year":"2014","journal-title":"International Journal of Scientific & Technology Research"},{"key":"IJCAC.2020040104-26","unstructured":"Tshilombo, D. P., & Rao, V. G. (2019). Two Way Authentication for Analytics as a Service in Cloud."},{"key":"IJCAC.2020040104-27","doi-asserted-by":"publisher","DOI":"10.1007\/s13174-010-0007-6"}],"container-title":["International Journal of Cloud Applications and Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=249162","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T16:33:34Z","timestamp":1651854814000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJCAC.2020040104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2020,4,1]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcac.2020040104","relation":{},"ISSN":["2156-1834","2156-1826"],"issn-type":[{"value":"2156-1834","type":"print"},{"value":"2156-1826","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,1]]}}}