A Review Article on Authentication Protocols in Cloud Computing

Authors

  • Umaima Fatima Student, Department of Computer Science & Engineering, Integral University, Lucknow, INDIA
  • Dr. Sheeba Parveen Assosiate Professor, Department of Computer Science & Engineering, Integral University, Lucknow, INDIA

DOI:

https://doi.org/10.31033/ijemr.13.2.38

Keywords:

Cloud Computing, Security Issues, Authentication, Authorization

Abstract

Cloud computing  technology   provides on demand computing resources like software, hardware and storage in pay-per-use model. Cloud computing is very beneficial for today’s organizations, as there is no need to maintain physical infrastructure. These services and resources can be accessed from anywhere anytime over the internet. It is cost effective as users only need to pay for resources they use. Many individuals and organizations have shifted themselves over cloud environment as it is cheaper and convenient. As huge amount of sensitive data is being stored and processing in cloud computing environment so there is major concern of security. Lack of security may cause several issues. It may result in loss of organisation’s data and may even leak confidential data of user and organisation to unwanted access. To implement security in cloud computing various authentication and encryption protocol exists. This aim of this paper is to review various authentication protocols given by various researchers all over the world.

Downloads

Download data is not yet available.

Published

2023-04-29

How to Cite

Fatima, U., & Parveen, D. S. (2023). A Review Article on Authentication Protocols in Cloud Computing. International Journal of Engineering and Management Research, 13(2), 225–231. https://doi.org/10.31033/ijemr.13.2.38