Research Article
Assessing the Effectiveness of Multi-Factor Authentication in Cloud-Based Big Data Environments
Issue:
Volume 12, Issue 2, June 2024
Pages:
17-27
Received:
25 July 2023
Accepted:
24 July 2024
Published:
6 August 2024
Abstract: There is increasing popularity of Big data and cloud computing in recent years, and it is offering both individuals and businesses a number of advantages. But as data volume and complexity rise, data security and privacy have become a serious problem. In order to safeguard sensitive data stored in the cloud from sophisticated cyberattacks, it is crucial to have strong security measures in place. Although multi-factor authentication (MFA) has gained popularity as a security mechanism, Because of the lack of in depth analysis of its efficacy in large data systems based in the cloud is not fully known. In order to determine if MFA is effective in large data environments based on the cloud, this study will examine how well it can defend against different types of cyberattacks. The study will analyze the benefits and drawbacks of MFA in this situation as well as the trade-offs that must be made between security and usability when putting this security measure into place. This study aims to evaluate the efficacy of MFA in cloud-based big data environments in order to offer insightful recommendations for the most effective ways to secure sensitive data in the cloud.
Abstract: There is increasing popularity of Big data and cloud computing in recent years, and it is offering both individuals and businesses a number of advantages. But as data volume and complexity rise, data security and privacy have become a serious problem. In order to safeguard sensitive data stored in the cloud from sophisticated cyberattacks, it is cr...
Show More
Research Article
Attacks, Challenges, and Countermeasures for an Integrated IoT Framework
Fadele Ayotunde Alaba*,
Ifeyinwa Marisa Madu,
Haliru Musa
Issue:
Volume 12, Issue 2, June 2024
Pages:
28-39
Received:
31 May 2024
Accepted:
1 July 2024
Published:
15 August 2024
Abstract: The Internet of Things (IoT) has lately attracted a lot of interest owing to the fact that it has several applications in a variety of fields and makes communication easier across a variety of levels. The IoT is made up of three unique levels, which are the physical layer, the network layer, and the application layer at the most fundamental level. The purpose of this study is to examine security threats and the responses that correspond to them for each layer of the IoT architecture. Additionally, the article investigates the implications that arise from security breaches on IoT devices. In addition to providing a detailed taxonomy of attacks, this research reveals security weaknesses that are present inside each tier of the IoT network. In addition to this, the article investigates a variety of modern security frameworks, investigates probable security flaws, and investigates remedies that correspond to those vulnerabilities. In conclusion, the article proposed the "Unified Federated Security Framework," which is an all-encompassing security architecture made specifically for IoT networks. In order to facilitate the ability of users inside the security layer to acquire access to resources situated within a separate security layer, the proposed framework is based on the building of trust across the three levels. This allows users to gain access to resources without having to utilise the account of another user.
Abstract: The Internet of Things (IoT) has lately attracted a lot of interest owing to the fact that it has several applications in a variety of fields and makes communication easier across a variety of levels. The IoT is made up of three unique levels, which are the physical layer, the network layer, and the application layer at the most fundamental level. ...
Show More