{"id":"https://openalex.org/W3006676423","doi":"https://doi.org/10.4018/ijcac.2020040104","title":"Multi Factor Two-way Hash-Based Authentication in Cloud Computing","display_name":"Multi Factor Two-way Hash-Based Authentication in Cloud Computing","publication_year":2020,"publication_date":"2020-02-14","ids":{"openalex":"https://openalex.org/W3006676423","doi":"https://doi.org/10.4018/ijcac.2020040104","mag":"3006676423"},"language":"en","primary_location":{"id":"doi:10.4018/ijcac.2020040104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcac.2020040104","pdf_url":null,"source":{"id":"https://openalex.org/S4210173373","display_name":"International Journal of Cloud Applications and Computing","issn_l":"2156-1826","issn":["2156-1826","2156-1834"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cloud Applications and Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109450688","display_name":"K. Devipriya","orcid":null},"institutions":[{"id":"https://openalex.org/I4210145126","display_name":"Aditya Birla (India)","ror":"https://ror.org/03pztks36","country_code":"IN","type":"company","lineage":["https://openalex.org/I4210145126"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"K. DeviPriya","raw_affiliation_strings":["Aditya Engineering College, Andhra Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Aditya Engineering College, Andhra Pradesh, India","institution_ids":["https://openalex.org/I4210145126"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039192287","display_name":"L. Sumalatha","orcid":"https://orcid.org/0000-0002-8113-9340"},"institutions":[{"id":"https://openalex.org/I142809039","display_name":"Jawaharlal Nehru Technological University, Kakinada","ror":"https://ror.org/05s9t8c95","country_code":"IN","type":"education","lineage":["https://openalex.org/I142809039"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sumalatha Lingamgunta","raw_affiliation_strings":["University College of Engineering, Kakinada, India"],"affiliations":[{"raw_affiliation_string":"University College of Engineering, Kakinada, India","institution_ids":["https://openalex.org/I142809039"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5109450688"],"corresponding_institution_ids":["https://openalex.org/I4210145126"],"apc_list":null,"apc_paid":null,"fwci":4.8043,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.95448777,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"10","issue":"2","first_page":"56","last_page":"76"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7721604108810425},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7691367864608765},{"id":"https://openalex.org/keywords/cryptographic-nonce","display_name":"Cryptographic nonce","score":0.662811815738678},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6355845332145691},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6186119318008423},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.5907540321350098},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.5887522101402283},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5328080654144287},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.49540865421295166},{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.46038317680358887},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.459891140460968},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.27469533681869507},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2038232684135437},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1133473813533783},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08271738886833191}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7721604108810425},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7691367864608765},{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.662811815738678},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6355845332145691},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6186119318008423},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.5907540321350098},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.5887522101402283},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5328080654144287},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.49540865421295166},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.46038317680358887},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.459891140460968},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.27469533681869507},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2038232684135437},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1133473813533783},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08271738886833191}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijcac.2020040104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcac.2020040104","pdf_url":null,"source":{"id":"https://openalex.org/S4210173373","display_name":"International Journal of Cloud Applications and Computing","issn_l":"2156-1826","issn":["2156-1826","2156-1834"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cloud Applications and Computing","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jcac00:v:10:y:2020:i:2:p:56-76","is_oa":false,"landing_page_url":"https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJCAC.2020040104","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6299999952316284,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W195982254","https://openalex.org/W595299357","https://openalex.org/W810414422","https://openalex.org/W1521657115","https://openalex.org/W1561851517","https://openalex.org/W1999788626","https://openalex.org/W2002984158","https://openalex.org/W2021923324","https://openalex.org/W2032404452","https://openalex.org/W2037545451","https://openalex.org/W2070164835","https://openalex.org/W2079960582","https://openalex.org/W2081713029","https://openalex.org/W2088555362","https://openalex.org/W2102922499","https://openalex.org/W2114296561","https://openalex.org/W2115023685","https://openalex.org/W2131646073","https://openalex.org/W2136522490","https://openalex.org/W2182961761","https://openalex.org/W2232723610","https://openalex.org/W2327503495","https://openalex.org/W2507351359","https://openalex.org/W2569378140","https://openalex.org/W2590788601","https://openalex.org/W2908781841","https://openalex.org/W2960225175","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2008183593","https://openalex.org/W125990426","https://openalex.org/W199184564","https://openalex.org/W1966405014","https://openalex.org/W76929021","https://openalex.org/W1967670435","https://openalex.org/W3113081412","https://openalex.org/W1980803971","https://openalex.org/W2123098853","https://openalex.org/W103173258"],"abstract_inverted_index":{"The":[0,21,126,146],"expansion":[1],"of":[2,23,41,64,70,154],"Cloud":[3,42,51],"computing":[4,43,52],"is":[5,53,78,129,152],"influencing":[6],"various":[7],"domains":[8],"such":[9],"as":[10],"education,":[11],"the":[12,38,49,68,117,122,133,149],"banking":[13],"sector,":[14],"industries,":[15],"government,":[16],"health":[17],"informatics,":[18],"and":[19,30,59,73,99,108,121,136],"individuals.":[20],"characteristics":[22],"an":[24],"easy":[25],"interface,":[26],"on-demand":[27],"access,":[28],"scalability,":[29],"low":[31],"infrastructure":[32],"investment":[33],"have":[34],"to":[35,37,55,67],"lead":[36],"fast":[39],"adaptation":[40],"based":[44],"upon":[45],"their":[46],"needs.":[47],"Despite":[48],"advantages,":[50],"open":[54],"more":[56],"security":[57,127],"risks":[58],"attacks":[60],"especially":[61],"in":[62,116],"terms":[63],"communication":[65],"due":[66],"lack":[69],"secure":[71,84,157],"authentication":[72,86],"privacy.":[74],"In":[75],"this":[76],"article":[77],"presented":[79],"a":[80,138],"novel":[81],"hash-based":[82],"multifactor":[83],"mutual":[85],"scheme":[87,151],"that":[88,102],"includes":[89],"mathematical":[90],"hashing":[91],"properties,":[92],"certificates,":[93],"nonce":[94],"values,":[95],"traditional":[96],"user":[97],"ids,":[98],"password":[100],"mechanisms":[101],"resist":[103],"MITM":[104],"attacks,":[105,107],"replay":[106],"forgery":[109],"attacks.":[110],"We":[111],"implemented":[112],"our":[113],"proposed":[114,150],"method":[115],"Microsoft":[118],"Azure":[119],"cloud":[120],"results":[123,147],"are":[124],"evaluated.":[125],"analysis":[128,140],"done":[130],"by":[131,141],"using":[132,142],"Scyther":[134],"tool":[135],"with":[137],"formal":[139],"GNY":[143],"belief":[144],"logic.":[145],"indicate":[148],"capable":[153],"providing":[155],"strong":[156],"authentication.":[158]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
