Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology

    Abstract
2015(Vol.9, Issue:8)
Article Information:

Authentication Methods in Cloud Computing: A Survey

Mahnoush Babaeizadeh, Majid Bakhtiari and Alwuhayd Muteb Mohammed
Corresponding Author:  Mahnoush Babaeizadeh 
Submitted: November ‎13, ‎2014
Accepted: January ‎27, ‎2015
Published: March 15, 2015
Abstract:
This study presents a review on the various methods of authentication in cloud environment. Authentication plays an important role in security of Cloud Computing (CC). It protects Cloud Service Providers (CSP) against various types of attacks, where the aim is to verify a user’s identity when a user wishes to request services from cloud servers. There are multiple authentication technologies that verify the identity of a user before granting access to resources.

Key words:  Authentication, biometric, cloud computing, information security, keystroke authentication, security and privacy,
Abstract PDF HTML
Cite this Reference:
Mahnoush Babaeizadeh, Majid Bakhtiari and Alwuhayd Muteb Mohammed, . Authentication Methods in Cloud Computing: A Survey. Research Journal of Applied Sciences, Engineering and Technology, (8): 655-664.
ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved