Volume :6 , Issue :4 ,Page :97-113
Abstract :Cloud computing outsources an efficient and economical Information Technology (IT) resources to small, mid and larger-scale organizations on demand. Despite huge benefits, many organizations are still reluctant to migrate to the cloud computing due to data security and privacy concerns. As result of these top and legitimate concerns, the stakeholder’s resources and services need to be protecte d from malicious use. Authentication is the fundamental operation to verify the legitimacy of the end users. In this article we describe an authentication scheme using multi-factors namely username and password, fingerprint biometric, secrete keys, cryptographically ge nerated random number and one-time Resource Allocation Number (RAN). This approach provides a generalized, complete, and convenient identity verification process for remote users. Our investigated mechanism not only provides the high-secure remote authentication at lowest cost but also preserves the privacy of user credentials and access keys from the service prov iders and other malicious attacks. With series of experiments we illustrate that our proposed scheme is more efficient and robust towards the malicious use of customer’s data in cloud.