A Brief Review on Cloud Computing Authentication Frameworks

14Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.

Abstract

Cloud computing is among the most widely used technologies worldwide as it helps individual users and organizations to store and share information conveniently and cost-effectively. However, data security is a major concern in cloud computing. Security involves guaranteed access to the data only to authorized users and protection against various threats and attacks. Security is generally achieved through the appropriate and efficient implementation of access control, authentication, and authorization mechanisms. Various frameworks have been proposed and implemented for authentication and access control in cloud computing. This paper discusses some of the main authentication frameworks in cloud computing, highlighting their methodologies, algorithms, and problems and identifying the issues that should form the focus of research in the area.

Cite

CITATION STYLE

APA

Khan, A. R., & Alnwihel, L. K. (2023). A Brief Review on Cloud Computing Authentication Frameworks. Engineering, Technology and Applied Science Research, 13(1), 9997–10004. https://doi.org/10.48084/etasr.5479

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free