HCI Authentication to Prevent Internal Threats in Cloud Computing
- Title
- HCI Authentication to Prevent Internal Threats in Cloud Computing
- Creator
- Choe H.; Aurelia S.
- Description
- Cloud computing reduces physical resources and simplifies common management tasks. Over the past decade, cloud computing has become an important IT (information technology) industry, driving cost savings, flexibility, convenience, and scalability. Despite these advantages, many government organizations and companies are still cautious about using cloud computing. They continue to believe that the threats inherent in cloud computing technology are greater and deadly than traditional technologies. Cloud computing security threats typically include insider attacks, malware attacks, information leaks and losses, distributed denial of service, and application programming interface vulnerability attacks. Technical security improvements for virtual networks are actively researched, and many are working hard. But defending against internal attackers is more than just a technical solution but a complement to manuals and company policy. In reality, however, there are cases of damage by internal attackers, and the damage is getting bigger. Technically malicious internal attackers can relatively easily manipulate the control system and cause malfunctions. This paper provides comprehensive information about security threats in cloud computing, shows the severity of attacks by insiders, analyzes the latest authentication technologies for humancomputer interaction, and identifies the pros and cons. This shows how HCI (humancomputer interaction) technology can be applied to cloud computing management servers. The result is an innovative security certification model that can be applied. 2020, Springer Nature Switzerland AG.
- Source
- EAI/Springer Innovations in Communication and Computing, pp. 119-135.
- Date
- 2020-01-01
- Publisher
- Springer Science and Business Media Deutschland GmbH
- Subject
- Biometric authentication; Cloud computing; FIDO; HCI; Multi-authentication
- Coverage
- Choe H., Department of Computer Science, CHRIST (Deemed to be University), Bengaluru, India; Aurelia S., Department of Computer Science, CHRIST (Deemed to be University), Bengaluru, India
- Rights
- Restricted Access
- Relation
- ISSN: 25228595
- Format
- Online
- Language
- English
- Type
- Book chapter
Collection
Citation
Choe H.; Aurelia S., “HCI Authentication to Prevent Internal Threats in Cloud Computing,” CHRIST (Deemed To Be University) Institutional Repository, accessed February 23, 2025, https://archives.christuniversity.in/items/show/18837.