Authentication in Cloud Computing Environments

Main Article Content

Amira Hassan Abed
Ahmed Abdelhafeez
Mohamed M. Fouad

Abstract

One solution that helps with straightforward, anytime, anywhere accessibility to reconfigurable computational capabilities is cloud computing. Users of this computing platform are genuinely concerned about security and need to find dependable providers of cloud services. Authentication is believed to be a main necessity for assuring secure cloud access. In this paper, we discussed the comprehensive and detailed frameworks constructed to assure successful authentication in cloud computing. Also, this survey paper discusses differences between considered techniques used in different frameworks.

Downloads

Download data is not yet available.

Article Details

How to Cite
Abed, A. H., Abdelhafeez, A., & Fouad, M. M. (2024). Authentication in Cloud Computing Environments. Multicriteria Algorithms With Applications, 5, 59-67. https://doi.org/10.61356/j.mawa.2024.5429
Section
Original Article

How to Cite

Abed, A. H., Abdelhafeez, A., & Fouad, M. M. (2024). Authentication in Cloud Computing Environments. Multicriteria Algorithms With Applications, 5, 59-67. https://doi.org/10.61356/j.mawa.2024.5429

Similar Articles

You may also start an advanced similarity search for this article.