Authentication Scheme in Cloud Computing Environment

Main Article Content

Palak Raina
Bhavik Patel

Abstract

Cloud computing could be a paradigm of rising technology, providing the variety of services over the web. With the additional advancement and with an advent of recent techniques, security is motility a threat to the present technology. Several authentication schemes are framed over the years to supply security. With additional technologies, the number of attacks has conjointly been terrible. The basic parole primarily based authentication, theme doesn’t offer abundant security for information in the cloud setting. So, a powerful authentication, theme is needed. In this paper, a study of ascendable and economical, user authentication, theme has been done. During this theme, the user entry is powerfully verified before being given entry to a cloud. This is often done by the theme of victimization the construct of an agent. In recommended model, to substantiate the identity of a user, consuming primarily based authentication agent is employed and for unregistered devices, software package as a service application has been used. To cut back the dependency of authentication and cryptography from main servers, separate servers are used for various processes.This provides additional reliable and secure system. Analysis of this recommended theme shows that the projected model can bring additional reliability, efficiency and full user trust in victimization cloud computing services and can bring additional security in cloud computing setting.

Keywords: Cloud Computing, User Authentication, SaaS, Cryptography

Downloads

Download data is not yet available.

Article Details

Section
Articles