Authentication and Authorization in Cloud : Reviewing The Trend

  • Pratiba D
  • Shobha G
  • Arjun A
N/ACitations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

-Cloud computing is a new paradigm to deliver services over the Internet. Data Security is the most critical issues in a cloud computing environment. Authentication is a key mechanism for information security that establish proof of identities to get access of information in the system. Authorization is an important identity service to avoid unauthorized access to cloud resources. According to various researches, access control and user authentication are the most important security concerns and challenging issues in cloud-based environments. In this context, in order to prevent the unauthorized access of the distributed system components, authentication and authorization functions are to be enforced effectively. In this paper, we make an analysis of various mechanisms for access control in cloud environment and identified various issues during authentication and authorization process.

Cite

CITATION STYLE

APA

Pratiba, D., Shobha, G., & Arjun A. (2014). Authentication and Authorization in Cloud : Reviewing The Trend. IJCSN International Journal of Computer Science and Network ISSN, 3(6), 2277–5420.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free