5 CONCLUSION
The solution suggested in this work is a reliable
contribution and it provides an effective solution to
the problem of data access security for remote users
when accessing to their data stored in cloud
environments. Our contribution aims to put forward
an adaptive authentication mechanism to protect the
personal data of each user in the cloud environment.
Thus, this mechanism strengthens effective
authentication and motivates remote users to access
services provided by the CSP with greater confidence
and greater ability to control their personal
information. Through this work, we have propounded
a new approach to protect the confidentiality and
integrity of data access from remote users anywhere
in the cloud. First, we have started with the definition
of cloud computing. Then, we have introduced the
problem of data security for remote users, while
presenting the data security risks that hinder the use
of cloud computing. After that, we have reviewed
some approaches to the data security problem of
remote users by performing a comparative study
between them at the end. In conclusion of this study,
we have proposed our approach of protection,
exposed in detail, whose performance has been
demonstrated in terms of communication and
computational costs, confidentiality and integrity of
data and resistance to various types of attacks, which
proves that this approach can outperform its
competitors.
REFERENCES
Marinescu, D. C. (2017). Cloud computing: theory and
practice. Morgan Kaufmann.
Vasiljeva, T., Shaikhulina, S., & Kreslins, K. (2017). Cloud
computing: business perspectives, benefits and
challenges for small and medium enterprises (case of
Latvia). Procedia Engineering, 178, 443-451.
Kumar, P. R., Raj, P. H., & Jelciana, P. (2018). Exploring
Data Security Issues and Solutions in Cloud
Computing. Procedia Computer Science, 125, 691-697.
Li, J., & Li, Q. (2018). Data security and risk assessment in
cloud computing. In ITM Web of Conferences (Vol. 17,
p. 03028). EDP Sciences.
Djellalbia, A., &Boukerram, A. (2016). Authentification
Anonyme dans un environnement Cloud (Doctoral
dissertation, Université Abderrahmane Mira-Bejaia).
Lee, A. (2015). Authentication scheme for smart learning
system in the cloud computing environment. Journal of
Computer Virology and Hacking Techniques, 11(3),
149-155.
Dey, S., Sampalli, S., & Ye, Q. (2016). MDA: message
digest-based authentication for mobile cloud
computing. Journal of Cloud Computing, 5(1), 18.
Lin, H. Y. (2017). Efficient mobile dynamic ID
authentication and key agreement scheme without
trusted servers. International Journal of
Communication Systems, 30(1), e2818.
Roy, S., Chatterjee, S., Das, A. K., Chattopadhyay, S.,
Kumar, N., & Vasilakos, A. V. (2017). On the design
of provably secure lightweight remote user
authentication scheme for mobile cloud computing
services. IEEE Access, 5, 25808-25825.
Binu, S., Misbahuddin, M., & Raj, P. (2018). A strong
single sign-on user authentication scheme using mobile
token without verifier table for cloud based services.
In Computer and Network Security Essentials (pp. 237-
261). Springer, Cham.
Obaidat, M., & Boudriga, N. (2007). Security of E-systems
and Computer Networks. Cambridge University Press.
Obaidat, M. S., Traore, I., & Woungang, I.
(2019). Biometric-Based Physical and Cybersecurity
Systems (pp. 165-187). Springer.
Singh, V., & Pandey, S. K. (2018, December). Revisiting
Cloud Security Threats: Replay attack. In 2018 4th
International Conference on Computing
Communication and Automation (ICCCA) (pp. 1-6).
IEEE.
Ramachandra, G., Iftikhar, M., & Khan, F. A. (2017). A
comprehensive survey on security in cloud
computing. Procedia Computer Science, 110, 465-472.
Kumar, M., Sharma, M., Raina, I., Kawatra, M., Sharma,
S., & Sinha, A. (2020). Help Me Invest: Investment
Tools and Security Risks. In Forensic Investigations
and Risk Management in Mobile and Wireless
Communications (pp. 257-269). IGI Global.
Hammami, H., Brahmi, H., Brahmi, I., & Yahia, S. B.
(2016). Security Issues in Cloud Computing and
Associated Alleviation Approaches. In 2016 12th
International Conference on Signal-Image Technology
& Internet-Based Systems (SITIS) (pp. 758-765).
IEEE.