There is increasing popularity of Big data and cloud computing in recent years, and it is offering both individuals and businesses a number of advantages. But as data volume and complexity rise, data security and privacy have become a serious problem. In order to safeguard sensitive data stored in the cloud from sophisticated cyberattacks, it is crucial to have strong security measures in place. Although multi-factor authentication (MFA) has gained popularity as a security mechanism, Because of the lack of in depth analysis of its efficacy in large data systems based in the cloud is not fully known. In order to determine if MFA is effective in large data environments based on the cloud, this study will examine how well it can defend against different types of cyberattacks. The study will analyze the benefits and drawbacks of MFA in this situation as well as the trade-offs that must be made between security and usability when putting this security measure into place. This study aims to evaluate the efficacy of MFA in cloud-based big data environments in order to offer insightful recommendations for the most effective ways to secure sensitive data in the cloud.
Published in | Internet of Things and Cloud Computing (Volume 12, Issue 2) |
DOI | 10.11648/j.iotcc.20241202.11 |
Page(s) | 17-27 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2024. Published by Science Publishing Group |
Cloud Computing, Big Data, Big Data Security, Multi Factor Authentication
[1] | J. Ruohonen, K. Hjerppe, and K. Kortesuo, “Crisis Communication in the Face of Data Breaches,” arXiv.org, Jun. 03, 2024. |
[2] | R. M and S. R. P, “Determining Intrusion Attacks Against Online Applications Using Cloud-Based Data Security,” ICST Transactions on Scalable Information Systems, Feb. 2024, |
[3] | Mylly, UM. Trade Secrets and the Data Act. IIC 55, 368–393 (2024). |
[4] | M. Dawood, S. Tu, C. Xiao, H. Alasmary, M. Waqas, and S. U. Rehman, “Cyberattacks and Security of Cloud Computing: A Complete Guideline,” Symmetry, vol. 15, no. 11, p. 1981, Oct. 2023, |
[5] | “Data Security and Privacy Protection for Cloud Storage: A Survey,” IEEE Journals & Magazine | IEEE Xplore, 2020. |
[6] | N. Allahrakha, “Balancing Cyber-security and Privacy: Legal and Ethical Considerations in the Digital Age,” Legal Issues in the Digital Age, vol. 4, no. 2, pp. 78–121, Jul. 2023, |
[7] | J. Abrera, “Data Privacy and Security in Cloud Computing: A Comprehensive Review,” Journal of Computer Science and Information Technology -, Jul. 2024, |
[8] | F. Aslam, “Role of Cloud Computing for Big Data,” Zenodo (CERN European Organization for Nuclear Research), Sep. 2023, |
[9] | S. Rani, P. Bhambri, and A. Kataria, “Integration of IoT, Big Data, and Cloud Computing Technologies,” in Chapman and Hall/CRC eBooks, 2023, pp. 1–21. |
[10] | A. S. G. P. Cpg Jd, Dba, Mba, “Privacy and Data Security,” Social Science Research Network, Jan. 2023, |
[11] | Privacy Preservation and Secured Data Storage in Cloud Computing. 2023. |
[12] | E. D. Knapp and J. T. Langill, Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems. 2011. [Online]. Available: |
[13] | Sundarakumar et al., “A comprehensive study and review of tuning the performance on database scalability in big data analytics,” Journal of Intelligent & Fuzzy Systems, vol. 44, no. 3, pp. 5231–5255, Mar. 2023, |
[14] | V. Sakthivel, S. Nanduri, and P. Prakash, “Role of Big Data Analytics in the Cloud Applications,” in River Publishers eBooks, 2024, pp. 69–94. |
[15] | “A Hierarchical Namespace Approach for Multi-Tenancy in Distributed Clouds,” IEEE Journals & Magazine | IEEE Xplore, 2024. |
[16] | S. Rizvi and I. Williams, “Analyzing transparency and malicious insiders prevention for cloud computing environment,” Computers & Security, vol. 137, p. 103622, Feb. 2024, |
[17] |
F. Basholli, A. Daberdinİ, and A. Basholli, “Detection and prevention of intrusions into computer systems,” Mar. 22, 2023.
https://publish.mersin.edu.tr/index.php/aed/article/view/941 |
[18] |
“Big Data & Cloud Computing IEEE Computer Society.” IEEE Computer Society,
https://www.computer.org/publications/tech-news/trends/big-data-and-cloud-computing/ |
[19] | Foote, Keith D. “Big Data and Cloud Security - DATAVERSITY.” DATAVERSITY, 21 July 2016, |
[20] | Neves, Pedro & Schmerl, Bradley & Cámara, Javier & Bernardino, Jorge. (2016). Big Data in Cloud Computing: Features and Issues. 307-314. |
[21] | Chithik Raja, Mohamed Sinnaiya. (2015). Big Data Security Issues and Management in Cloud Computing Environment. |
[22] | Hasan, Ragib. (2014). Security in Big Data and Cloud Computing: Challenges, Solutions, and Open Problems. |
[23] | Taylor, Christine. “What Is Big Data Security? Challenges & Solutions.” Datamation, Datamation, 26 Sept. 2021, |
[24] | R. K. Banyal, P. Jain and V. K. Jain, "Multi-factor Authentication Framework for Cloud Computing," 2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation, Seoul, Korea (South), 2013, pp. 105-110, |
[25] | Kurnia, S., Sari, S. A., & Shalahuddin, M. (2019). A systematic literature review of the types of authentication safety practices among internet users. International Journal of Advanced Computer Science and Applications, 10 (11), 414-421. |
[26] | Y. Wang, R. Chen, and Z. Yan, "Authentication for Big Data Processing in Cloud Environments: State-of-the-Art and Research Challenges," IEEE Transactions on Services Computing, vol. 10, no. 2, pp. 274-284, 2017. |
[27] | A. H. Y. Mohammed, R. A. Dziyauddin, and L. A. Latiff, “Current Multi-factor of Authentication: Approaches, Requirements, Attacks and Challenges,” International Journal of Advanced Computer Science and Applications/International Journal of Advanced Computer Science & Applications, vol. 14, no. 1, Jan. 2023, |
[28] | H. U. Khan, M. Sohail, S. Nazir, T. Hussain, B. Shah, and F. Ali, “Role of authentication factors in Fin-tech mobile transaction security,” Journal of Big Data, vol. 10, no. 1, Sep. 2023, |
[29] | A. Nanda, J. J. Jeong, S. W. A. Shah, M. Nosouhi, and R. Doss, “Examining Usable Security Features and User Perceptions of Physical Authentication Devices,” Computers & Security, vol. 139, p. 103664, Apr. 2024, |
APA Style
Mali, S. (2024). Assessing the Effectiveness of Multi-Factor Authentication in Cloud-Based Big Data Environments. Internet of Things and Cloud Computing, 12(2), 17-27. https://doi.org/10.11648/j.iotcc.20241202.11
ACS Style
Mali, S. Assessing the Effectiveness of Multi-Factor Authentication in Cloud-Based Big Data Environments. Internet Things Cloud Comput. 2024, 12(2), 17-27. doi: 10.11648/j.iotcc.20241202.11
AMA Style
Mali S. Assessing the Effectiveness of Multi-Factor Authentication in Cloud-Based Big Data Environments. Internet Things Cloud Comput. 2024;12(2):17-27. doi: 10.11648/j.iotcc.20241202.11
@article{10.11648/j.iotcc.20241202.11, author = {Saroj Mali}, title = {Assessing the Effectiveness of Multi-Factor Authentication in Cloud-Based Big Data Environments }, journal = {Internet of Things and Cloud Computing}, volume = {12}, number = {2}, pages = {17-27}, doi = {10.11648/j.iotcc.20241202.11}, url = {https://doi.org/10.11648/j.iotcc.20241202.11}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.iotcc.20241202.11}, abstract = {There is increasing popularity of Big data and cloud computing in recent years, and it is offering both individuals and businesses a number of advantages. But as data volume and complexity rise, data security and privacy have become a serious problem. In order to safeguard sensitive data stored in the cloud from sophisticated cyberattacks, it is crucial to have strong security measures in place. Although multi-factor authentication (MFA) has gained popularity as a security mechanism, Because of the lack of in depth analysis of its efficacy in large data systems based in the cloud is not fully known. In order to determine if MFA is effective in large data environments based on the cloud, this study will examine how well it can defend against different types of cyberattacks. The study will analyze the benefits and drawbacks of MFA in this situation as well as the trade-offs that must be made between security and usability when putting this security measure into place. This study aims to evaluate the efficacy of MFA in cloud-based big data environments in order to offer insightful recommendations for the most effective ways to secure sensitive data in the cloud. }, year = {2024} }
TY - JOUR T1 - Assessing the Effectiveness of Multi-Factor Authentication in Cloud-Based Big Data Environments AU - Saroj Mali Y1 - 2024/08/06 PY - 2024 N1 - https://doi.org/10.11648/j.iotcc.20241202.11 DO - 10.11648/j.iotcc.20241202.11 T2 - Internet of Things and Cloud Computing JF - Internet of Things and Cloud Computing JO - Internet of Things and Cloud Computing SP - 17 EP - 27 PB - Science Publishing Group SN - 2376-7731 UR - https://doi.org/10.11648/j.iotcc.20241202.11 AB - There is increasing popularity of Big data and cloud computing in recent years, and it is offering both individuals and businesses a number of advantages. But as data volume and complexity rise, data security and privacy have become a serious problem. In order to safeguard sensitive data stored in the cloud from sophisticated cyberattacks, it is crucial to have strong security measures in place. Although multi-factor authentication (MFA) has gained popularity as a security mechanism, Because of the lack of in depth analysis of its efficacy in large data systems based in the cloud is not fully known. In order to determine if MFA is effective in large data environments based on the cloud, this study will examine how well it can defend against different types of cyberattacks. The study will analyze the benefits and drawbacks of MFA in this situation as well as the trade-offs that must be made between security and usability when putting this security measure into place. This study aims to evaluate the efficacy of MFA in cloud-based big data environments in order to offer insightful recommendations for the most effective ways to secure sensitive data in the cloud. VL - 12 IS - 2 ER -