This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
|
||||||||
|
Paper Details
Paper Title
Comparative Study on Authentication Schemes for Cloud Computing
Authors
  Shikha Choksi
Abstract
Cloud computing has changed the corporate as well as educational industry ever since it evolved. Cloud computing is basically convenient, cost effective and on demand service offered to the clients. This can, for instance, lead to cost reserve funds, better resource usage and removing the need of specialized technical skill for the tenants. There are huge security concerns when utilizing cloud services. Security is extremely vital in cloud computing since individuals and organizations store private information in the cloud. It should likewise be not difficult to utilize the services provided, since cloud service providers have such a large number of tenants with diverse specialized background. Since the control of services and information required for the regular run of a organization is handled by third party providers, tenants needs to believe the third party cloud service provider, and trust that they handle their information in a right way, and resources are available as and when needed. Many approaches for authentication in cloud services have been proposed. They are either insecure, intricate or highly expensive. In this work we have carried of the comparative study of different authentication schemes in cloud computing finally summarize on the basis of different evaluation criteria.
Keywords- cloud computing, authentication, security
Publication Details
Unique Identification Number - IJEDR1402238Page Number(s) - 2785-2788Pubished in - Volume 2 | Issue 2 | June 2014DOI (Digital Object Identifier) -    Publisher - IJEDR (ISSN - 2321-9939)
Cite this Article
  Shikha Choksi,   "Comparative Study on Authentication Schemes for Cloud Computing", International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Volume.2, Issue 2, pp.2785-2788, June 2014, Available at :http://www.ijedr.org/papers/IJEDR1402238.pdf
Article Preview
|
|
||||||
|