This paper is published in Volume-3, Issue-2, 2017
Area
Computer Science
Author
Mohammed Ubada
Org/Univ
Jamal Mohamed College, Tiruchirappalli, Tamil Nadu, India
Keywords
Cloud Computing, Authentication, Data Security.
Citations
IEEE
Mohammed Ubada. A Survey on Authentication in Cloud Computing For Data Storage Security, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Mohammed Ubada (2017). A Survey on Authentication in Cloud Computing For Data Storage Security. International Journal of Advance Research, Ideas and Innovations in Technology, 3(2) www.IJARIIT.com.
MLA
Mohammed Ubada. "A Survey on Authentication in Cloud Computing For Data Storage Security." International Journal of Advance Research, Ideas and Innovations in Technology 3.2 (2017). www.IJARIIT.com.
Mohammed Ubada. A Survey on Authentication in Cloud Computing For Data Storage Security, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Mohammed Ubada (2017). A Survey on Authentication in Cloud Computing For Data Storage Security. International Journal of Advance Research, Ideas and Innovations in Technology, 3(2) www.IJARIIT.com.
MLA
Mohammed Ubada. "A Survey on Authentication in Cloud Computing For Data Storage Security." International Journal of Advance Research, Ideas and Innovations in Technology 3.2 (2017). www.IJARIIT.com.
Abstract
Cloud computing is an internet-based computing, where a set of resources and services such as applications, storage, and servers are delivered to computers and devices through the Internet. Cloud Computing is continuously growing and showing consistent growth in the field of computing. The major challenging task in cloud computing is the security and privacy issues caused by the outsourcing of infrastructure, sensitive data and critical applications and its multi-tenancy nature. The security for Cloud Computing is emerging area for research work and this paper discusses various types of authentication methods.