Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Survey on User Authentication for Cloud Computing


Affiliations
1 St.Joseph‟s College (Autonomous), Tiruchirapalli, Tamil Nadu, India
     

   Subscribe/Renew Journal


Cloud computing is scattering widely, users and service providers enables to use resource or service inexpensively and simply without owning all the resource required. In this paper, it was discussed the brief as well as overview of user authentication, including the concept of authentication and various publication of authentication. Authentication plays a vital role in cloud computing, hereby, we discuss the surveys done for user authentication, its methodology, author motivation, his contribution, issues, drawbacks etc. The composition of this paper involves: Base Concepts of Authentication, User Authentication, Various Publication and its issues and conclusion. By discussing the above mentioned criteria the better idea and hierarchical approach and challenges were showed up. The level of security and its improvements were mentioned in its types. As the cloud is the new technology among the plenty users, its security should get updated as per trend, which was discussed.

Keywords

Challenges, Hierarchical Approach, Publication, User Authentication, Security.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 150

PDF Views: 1




  • Survey on User Authentication for Cloud Computing

Abstract Views: 150  |  PDF Views: 1

Authors

I. Arulmani
St.Joseph‟s College (Autonomous), Tiruchirapalli, Tamil Nadu, India
L. Arockiam
St.Joseph‟s College (Autonomous), Tiruchirapalli, Tamil Nadu, India
N. Veeraragavan
St.Joseph‟s College (Autonomous), Tiruchirapalli, Tamil Nadu, India

Abstract


Cloud computing is scattering widely, users and service providers enables to use resource or service inexpensively and simply without owning all the resource required. In this paper, it was discussed the brief as well as overview of user authentication, including the concept of authentication and various publication of authentication. Authentication plays a vital role in cloud computing, hereby, we discuss the surveys done for user authentication, its methodology, author motivation, his contribution, issues, drawbacks etc. The composition of this paper involves: Base Concepts of Authentication, User Authentication, Various Publication and its issues and conclusion. By discussing the above mentioned criteria the better idea and hierarchical approach and challenges were showed up. The level of security and its improvements were mentioned in its types. As the cloud is the new technology among the plenty users, its security should get updated as per trend, which was discussed.

Keywords


Challenges, Hierarchical Approach, Publication, User Authentication, Security.