Authentication Scheme in Cloud Computing Environment
Main Article Content
Abstract
Cloud computing could be a paradigm of rising technology, providing the variety of services over the web. With the additional advancement and with an advent of recent techniques, security is motility a threat to the present technology. Several authentication schemes are framed over the years to supply security. With additional technologies, the number of attacks has conjointly been terrible. The basic parole primarily based authentication, theme doesn’t offer abundant security for information in the cloud setting. So, a powerful authentication, theme is needed. In this paper, a study of ascendable and economical, user authentication, theme has been done. During this theme, the user entry is powerfully verified before being given entry to a cloud. This is often done by the theme of victimization the construct of an agent. In recommended model, to substantiate the identity of a user, consuming primarily based authentication agent is employed and for unregistered devices, software package as a service application has been used. To cut back the dependency of authentication and cryptography from main servers, separate servers are used for various processes.This provides additional reliable and secure system. Analysis of this recommended theme shows that the projected model can bring additional reliability, efficiency and full user trust in victimization cloud computing services and can bring additional security in cloud computing setting.
Keywords: Cloud Computing, User Authentication, SaaS, Cryptography
Keywords: Cloud Computing, User Authentication, SaaS, Cryptography
Downloads
Download data is not yet available.
Article Details
Section
Articles
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.