A Review Article on Authentication Protocols in Cloud Computing

نویسندگان

چکیده

Cloud computing technology provides on demand resources like software, hardware and storage in pay-per-use model. is very beneficial for today’s organizations, as there no need to maintain physical infrastructure. These services can be accessed from anywhere anytime over the internet. It cost effective users only pay they use. Many individuals organizations have shifted themselves cloud environment it cheaper convenient. As huge amount of sensitive data being stored processing so major concern security. Lack security may cause several issues. result loss organisation’s even leak confidential user organisation unwanted access. To implement various authentication encryption protocol exists. This aim this paper review protocols given by researchers all world.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mutual Authentication in Cloud Computing - A Review

Cloud computing nowadays has been involved in everyone’s life. This emerging technology allows users to share its resources globally. Cloud computing is aimed at providing IT as a service to the cloud users on-demand basis with greater flexibility, availability, reliability and scalability with utility computing model. Among all researching areas of cloud computing, mutual authentication is one...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Servey and Analysis of Authentication Protocols in Cloud Computing

Cloud computing is one of the most emerging technologies in the world providing computing resources as a service on demand via internet maintained by third party service provider. In cloud environment trust is one of the most sensitive and important issue. In order to maintain the privacy of certain user we need strong authentication mechanism. This paper will discuss about the available authen...

متن کامل

Review on Privacy - Preserving Authentication application in Cloud Computing Sharing

The authors suggest using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between service providers and data owners. In this paper, we investigate the problem of data security in cloud data storage, which is essentially a distributed storage system. To achieve the assurances of cloud data integrity and availability and enforce the quali...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Engineering and Management Research

سال: 2023

ISSN: ['2250-0758', '2394-6962']

DOI: https://doi.org/10.31033/ijemr.13.2.38