Abstract
|
Article Information:
Authentication Methods in Cloud Computing: A Survey
Mahnoush Babaeizadeh, Majid Bakhtiari and Alwuhayd Muteb Mohammed
Corresponding Author: Mahnoush Babaeizadeh
Submitted: November 13, 2014
Accepted: January 27, 2015
Published: March 15, 2015 |
Abstract:
|
This study presents a review on the various methods of authentication in cloud environment. Authentication plays an important role in security of Cloud Computing (CC). It protects Cloud Service Providers (CSP) against various types of attacks, where the aim is to verify a user’s identity when a user wishes to request services from cloud servers. There are multiple authentication technologies that verify the identity of a user before granting access to resources.
Key words: Authentication, biometric, cloud computing, information security, keystroke authentication, security and privacy,
|
Abstract
|
PDF
|
HTML |
|
Cite this Reference:
Mahnoush Babaeizadeh, Majid Bakhtiari and Alwuhayd Muteb Mohammed, . Authentication Methods in Cloud Computing: A Survey. Research Journal of Applied Sciences, Engineering and Technology, (8): 655-664.
|
|
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|