Open Access   Article Go Back

Authentication Model on Cloud Computing

Swapnil Rajesh Telrandhe1 , Deepak Kapgate2

Section:Survey Paper, Product Type: Journal Paper
Volume-2 , Issue-10 , Page no. 33-37, Oct-2014

Online published on Nov 02, 2014

Copyright © Swapnil Rajesh Telrandhe , Deepak Kapgate . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Swapnil Rajesh Telrandhe , Deepak Kapgate, “Authentication Model on Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.10, pp.33-37, 2014.

MLA Style Citation: Swapnil Rajesh Telrandhe , Deepak Kapgate "Authentication Model on Cloud Computing." International Journal of Computer Sciences and Engineering 2.10 (2014): 33-37.

APA Style Citation: Swapnil Rajesh Telrandhe , Deepak Kapgate, (2014). Authentication Model on Cloud Computing. International Journal of Computer Sciences and Engineering, 2(10), 33-37.

BibTex Style Citation:
@article{Telrandhe_2014,
author = {Swapnil Rajesh Telrandhe , Deepak Kapgate},
title = {Authentication Model on Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2014},
volume = {2},
Issue = {10},
month = {10},
year = {2014},
issn = {2347-2693},
pages = {33-37},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=280},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=280
TI - Authentication Model on Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Swapnil Rajesh Telrandhe , Deepak Kapgate
PY - 2014
DA - 2014/11/02
PB - IJCSE, Indore, INDIA
SP - 33-37
IS - 10
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3798 3533 downloads 3653 downloads
  
  
           

Abstract

Cloud computing is an internet-based computing, where a set of resources and services such as applications, Storage and servers are delivered to computers and devices through the Internet. It incorporates large open distributed system, virtualization and internet delivery of services, dynamic provision of reconfigurable resources and on – demand operations. Cloud Computing is continuously growing and showing consistent growth in the field of computing. The major challenging task in cloud computing is the security and privacy issues caused by the outsourcing of infrastructure, sensitive data and critical applications and its multi- tenancy nature. The security for Cloud Computing is emerging area for research work and this paper discusses various types of authentication methods and multi-factor user authentication.

Key-Words / Index Term

Cloud Computing, Security Issues, Cloud Computing Layers, Architecture diagram of AMOCC

References

[1] P. Barham et al., Xen and the Art of Virtualization, Proc. ACM Symposium on Operating Systems, Bolton Landing, NY, October 19–22, 2003.
[2] M.N. Bennani and D.A. Menasc´e, Resource Allocation for Autonomic Data Centers Using Analytic Performance Models, Proc. 2005 IEEE International Conference on Autonomic Computing, Seattle, WA, June 13-16, 2005
[3] R.J. Creasy, Digital Certificate Authentication, IBM J. Research and Development, Sept. 1981, pp. 483–490.
[4] R. Figueiredo, P.A. Dinda, and J. Fortes, Cloud services, IEEE Internet Computing, May 2005, Vol. 38, No. 5.
[5] R.P. Goldberg, Survey of Virtual Machine Research for Authentication, IEEE Computer, June 1974, pp.34–44
[6] G.J. Popek and R.P. Goldberg, Formal Requirements for Cloud Architectures, Comm. ACM, July 1975, pp. 412–421.
[7] D.A. Menasc´e, V.A.F. Almeida, and L.W. Dowdy, Performance by Design: Computer Capacity Planning by Example, Prentice Hall, Upper Saddle River, 2004.
[8] M. Rosenblum and T. Garfinkel, Virtual Machine Monitors: Current Technology and Future Trends, IEEE Internet Computing, May 2005, Vol. 38, No. 5.
[9] R. Uhlig et. al., Microsoft Cloud Technology, IEEE Internet Computing, May 2005, Vol. 38, No. 5.
[10] A. Whitaker, R.S. Cox, M. Shaw, and S.D. Gribble,-Rethinking the Design of Virtual Machine Monitors, IEEE Internet Computing, May 2005, Vol. 38, No. 5