Authentication Model on Cloud Computing
Swapnil Rajesh Telrandhe1 , Deepak Kapgate2
Section:Survey Paper, Product Type: Journal Paper
Volume-2 ,
Issue-10 , Page no. 33-37, Oct-2014
Online published on Nov 02, 2014
Copyright © Swapnil Rajesh Telrandhe , Deepak Kapgate . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Swapnil Rajesh Telrandhe , Deepak Kapgate, “Authentication Model on Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.10, pp.33-37, 2014.
MLA Style Citation: Swapnil Rajesh Telrandhe , Deepak Kapgate "Authentication Model on Cloud Computing." International Journal of Computer Sciences and Engineering 2.10 (2014): 33-37.
APA Style Citation: Swapnil Rajesh Telrandhe , Deepak Kapgate, (2014). Authentication Model on Cloud Computing. International Journal of Computer Sciences and Engineering, 2(10), 33-37.
BibTex Style Citation:
@article{Telrandhe_2014,
author = {Swapnil Rajesh Telrandhe , Deepak Kapgate},
title = {Authentication Model on Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2014},
volume = {2},
Issue = {10},
month = {10},
year = {2014},
issn = {2347-2693},
pages = {33-37},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=280},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=280
TI - Authentication Model on Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Swapnil Rajesh Telrandhe , Deepak Kapgate
PY - 2014
DA - 2014/11/02
PB - IJCSE, Indore, INDIA
SP - 33-37
IS - 10
VL - 2
SN - 2347-2693
ER -
VIEWS | XML | |
3913 | 3616 downloads | 3739 downloads |
Abstract
Cloud computing is an internet-based computing, where a set of resources and services such as applications, Storage and servers are delivered to computers and devices through the Internet. It incorporates large open distributed system, virtualization and internet delivery of services, dynamic provision of reconfigurable resources and on – demand operations. Cloud Computing is continuously growing and showing consistent growth in the field of computing. The major challenging task in cloud computing is the security and privacy issues caused by the outsourcing of infrastructure, sensitive data and critical applications and its multi- tenancy nature. The security for Cloud Computing is emerging area for research work and this paper discusses various types of authentication methods and multi-factor user authentication.
Key-Words / Index Term
Cloud Computing, Security Issues, Cloud Computing Layers, Architecture diagram of AMOCC
References
[1] P. Barham et al., Xen and the Art of Virtualization, Proc. ACM Symposium on Operating Systems, Bolton Landing, NY, October 19–22, 2003.
[2] M.N. Bennani and D.A. Menasc´e, Resource Allocation for Autonomic Data Centers Using Analytic Performance Models, Proc. 2005 IEEE International Conference on Autonomic Computing, Seattle, WA, June 13-16, 2005
[3] R.J. Creasy, Digital Certificate Authentication, IBM J. Research and Development, Sept. 1981, pp. 483–490.
[4] R. Figueiredo, P.A. Dinda, and J. Fortes, Cloud services, IEEE Internet Computing, May 2005, Vol. 38, No. 5.
[5] R.P. Goldberg, Survey of Virtual Machine Research for Authentication, IEEE Computer, June 1974, pp.34–44
[6] G.J. Popek and R.P. Goldberg, Formal Requirements for Cloud Architectures, Comm. ACM, July 1975, pp. 412–421.
[7] D.A. Menasc´e, V.A.F. Almeida, and L.W. Dowdy, Performance by Design: Computer Capacity Planning by Example, Prentice Hall, Upper Saddle River, 2004.
[8] M. Rosenblum and T. Garfinkel, Virtual Machine Monitors: Current Technology and Future Trends, IEEE Internet Computing, May 2005, Vol. 38, No. 5.
[9] R. Uhlig et. al., Microsoft Cloud Technology, IEEE Internet Computing, May 2005, Vol. 38, No. 5.
[10] A. Whitaker, R.S. Cox, M. Shaw, and S.D. Gribble,-Rethinking the Design of Virtual Machine Monitors, IEEE Internet Computing, May 2005, Vol. 38, No. 5