COMPREHENSIVE ANALYSIS OF VARIOUS AUTHENTICATION TECHNIQUES TO ENHANCE THE SECURITY OF CLOUD ENVIRON
Author : Manreet Sohal, Sandeep Sharma [ Volume No.:VII, Issue No.II-Mar 2018] [Page No : 847-852] [2018]
|
|
Cloud computing is overpowering the means by which data storage, transmission and execution are altering. But while exploiting services of the cloud, there are enormous security concerns. Among this authentication of the cloud user is the greatest security roadblock for cloud computing. Authentication is an incredible part of data security that can be used to prevent unauthorized users to penetrate into the cloud environment. There are many types of authentication schemes available for cloud environment. Several research works have been done on these schemes to formulate new and enhanced authentication techniques that provide greater security for the data stored on the cloud. In this paper several such authentication techniques have been studied and evaluated. A comparative analysis has been done to figure out the contributions of these techniques towards cloud security and privacy. Besides this the shortcomings of these existing techniques have also been enlisted so that they can be focused for research in the future to enhance the security of the data.
Contact us
editor[at]ctts[dot]in

Warning: Trying to access array offset on value of type null in C:\xampp\htdocs\ctts\include\ad.php on line 8