A review article on authentication protocols in cloud computing

U Fatima, S Parveen - International Journal of …, 2023 - ijemr.vandanapublications.com
U Fatima, S Parveen
International Journal of Engineering and Management …, 2023ijemr.vandanapublications.com
Cloud computing technology provides on demand computing resources like software,
hardware and storage in pay-per-use model. Cloud computing is very beneficial for today's
organizations, as there is no need to maintain physical infrastructure. These services and
resources can be accessed from anywhere anytime over the internet. It is cost effective as
users only need to pay for resources they use. Many individuals and organizations have
shifted themselves over cloud environment as it is cheaper and convenient. As huge amount …
Abstract
Cloud computing technology provides on demand computing resources like software, hardware and storage in pay-per-use model. Cloud computing is very beneficial for today’s organizations, as there is no need to maintain physical infrastructure. These services and resources can be accessed from anywhere anytime over the internet. It is cost effective as users only need to pay for resources they use. Many individuals and organizations have shifted themselves over cloud environment as it is cheaper and convenient. As huge amount of sensitive data is being stored and processing in cloud computing environment so there is major concern of security. Lack of security may cause several issues. It may result in loss of organisation’s data and may even leak confidential data of user and organisation to unwanted access. To implement security in cloud computing various authentication and encryption protocol exists. This aim of this paper is to review various authentication protocols given by various researchers all over the world.
ijemr.vandanapublications.com
Showing the best result for this search. See all results