Authentication in Cloud Computing Environments
Main Article Content
Abstract
One solution that helps with straightforward, anytime, anywhere accessibility to reconfigurable computational capabilities is cloud computing. Users of this computing platform are genuinely concerned about security and need to find dependable providers of cloud services. Authentication is believed to be a main necessity for assuring secure cloud access. In this paper, we discussed the comprehensive and detailed frameworks constructed to assure successful authentication in cloud computing. Also, this survey paper discusses differences between considered techniques used in different frameworks.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.