Volume 20 No 10 (2022)
 Download PDF
A Survey on Authentication Techniques in Cloud Computing
M.Nandhini Sharphathy , Dr. V. Sumalatha
Abstract
With the advancement of Cloud Computing, customers and service providers can quickly and cheaply use the resources or services without having the necessary resources. Cloud Computing however has some security problems such as misconfiguration, unauthorized access, insecure interfaces, hijacking of accounts, external sharing of data and cyberattacks. To avoid these problems, authentication plays a vital role in Cloud Computing (CC) security. This survey presents the security issues and various authentication techniques for Cloud Computing
Keywords
Cloud Computing, Security, Authentication, Access Control
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.