A survey on different authentication schemes in cloud computing environment Sudha S.*, Dr. Manikandasaran S. S.** *Research Scholar of Bharathidasan University Assistant Professor of Computer Science, Srinivasan College of Arts & Science, Perambalur, Tamil Nadu, India **Research Supervisor, Director, Department of Computer Applications, Christhu Raj College, Tiruchirappalli, Tamil Nadu, India. arthikumari10@gmail.com, moni.tamil@gmail.com Online published on 24 October, 2019. Abstract Cloud computing technology has been a new buzzword in the IT industry and expecting a new horizon for the coming world and it is also considered as a pinnacle of computing technology. Business and IT professional is progressively marching towards cloud generations as it consists of an internet-based ubiquitous computing technology and on-demand network model, which consists of software and provides the services like computation, data access, and storage service that don't have need of user's facts of the physical locality and configuration of the system that delivers the services. The paradigm of cloud computing is new, keeps everyone connected on-the-go and offers a plethora of services over the internet, hence, data security is paramount in cloud computing environment to have an access to these resources securely. Purloining an individual's legitimacy is the most insidious way of invading user's privacy; hence, authentication technique is need of the hour. Authentication technique is an unparalleled key technology for information security, which is a mechanism to ascertain proof of identities of the user to get access to information safely and mitigate the security risks in the cloud environment. In this paper, we focus on authentication techniques, which is the most challenging and promising component and there are three main approaches to user authentication are knowledge-based, possession-based, and biometric-based. In this paper, a comprehensive review and assessment of the various authentication approaches, strategies, and mechanisms has been done for a deep understanding of a secure and sturdy authentication process prevailing in a cloud environment. Top Keywords Cloud computing, Authentication, Encryption algorithm, security. Top |