(18.116.42.158)
Users online: 6148     
Ijournet
Email id
 

International Journal of Management, IT and Engineering
Year : 2019, Volume : 9, Issue : 1
First page : ( 359) Last page : ( 375)
Online ISSN : 2249-0558.

A survey on different authentication schemes in cloud computing environment

Sudha S.*, Dr. Manikandasaran S. S.**

*Research Scholar of Bharathidasan University Assistant Professor of Computer Science, Srinivasan College of Arts & Science, Perambalur, Tamil Nadu, India

**Research Supervisor, Director, Department of Computer Applications, Christhu Raj College, Tiruchirappalli, Tamil Nadu, India. arthikumari10@gmail.com, moni.tamil@gmail.com

Online published on 24 October, 2019.

Abstract

Cloud computing technology has been a new buzzword in the IT industry and expecting a new horizon for the coming world and it is also considered as a pinnacle of computing technology. Business and IT professional is progressively marching towards cloud generations as it consists of an internet-based ubiquitous computing technology and on-demand network model, which consists of software and provides the services like computation, data access, and storage service that don't have need of user's facts of the physical locality and configuration of the system that delivers the services. The paradigm of cloud computing is new, keeps everyone connected on-the-go and offers a plethora of services over the internet, hence, data security is paramount in cloud computing environment to have an access to these resources securely. Purloining an individual's legitimacy is the most insidious way of invading user's privacy; hence, authentication technique is need of the hour. Authentication technique is an unparalleled key technology for information security, which is a mechanism to ascertain proof of identities of the user to get access to information safely and mitigate the security risks in the cloud environment. In this paper, we focus on authentication techniques, which is the most challenging and promising component and there are three main approaches to user authentication are knowledge-based, possession-based, and biometric-based. In this paper, a comprehensive review and assessment of the various authentication approaches, strategies, and mechanisms has been done for a deep understanding of a secure and sturdy authentication process prevailing in a cloud environment.

Top

Keywords

Cloud computing, Authentication, Encryption algorithm, security.

Top

  
║ Site map ║ Privacy Policy ║ Copyright ║ Terms & Conditions ║ Page Rank Tool
751,592,030 visitor(s) since 30th May, 2005.
All rights reserved. Site designed and maintained by DIVA ENTERPRISES PVT. LTD..
Note: Please use Internet Explorer (6.0 or above). Some functionalities may not work in other browsers.