A Review Article on Authentication Protocols in Cloud Computing
Keywords:Cloud Computing, Security Issues, Authentication, Authorization
Cloud computing technology provides on demand computing resources like software, hardware and storage in pay-per-use model. Cloud computing is very beneficial for today’s organizations, as there is no need to maintain physical infrastructure. These services and resources can be accessed from anywhere anytime over the internet. It is cost effective as users only need to pay for resources they use. Many individuals and organizations have shifted themselves over cloud environment as it is cheaper and convenient. As huge amount of sensitive data is being stored and processing in cloud computing environment so there is major concern of security. Lack of security may cause several issues. It may result in loss of organisation’s data and may even leak confidential data of user and organisation to unwanted access. To implement security in cloud computing various authentication and encryption protocol exists. This aim of this paper is to review various authentication protocols given by various researchers all over the world.
How to Cite
Copyright (c) 2023 Umaima Fatima, Dr. Sheeba Parveen
This work is licensed under a Creative Commons Attribution 4.0 International License.