ABSTRACT

This chapter discusses classification of various authentication models along with their usage to handle different categories of threats. The concept of mobile cloud computing and the respective security vulnerabilities of mobile devices and cloud computing have been proposed. In understanding cloud computing vulnerabilities, the authors distinguish generic security concerns from cloud-specific issues. A survey of authentication methods in mobile cloud computing proposes a new classification model. The problems and promises of using cloud and biometrics explore the mutual benefits of biometrics technology and cloud computing. The strong authentication property of biometrics assures security in cloud computing. The major difference of the proposed scheme in comparison to existing ones can be summarized as follows: In later work on same biometric feature, i.e., fingerprint proposed an Indirect Fingerprint Authentication Scheme in Cloud Computing. The classification comprises combinations that are kept as secret by the user and needs to be provided at the time of authentication.