Authentication Model on Cloud Computing

Authors

  • Rajesh Telrandhe S G.H Raisoni Academy of Engineering & Technology, Nagpur
  • Kapgate D G.H Raisoni Academy of Engineering & Technology, Nagpur

Keywords:

Cloud Computing, Security Issues, Cloud Computing Layers, Architecture diagram of AMOCC

Abstract

Cloud computing is an internet-based computing, where a set of resources and services such as applications, Storage and servers are delivered to computers and devices through the Internet. It incorporates large open distributed system, virtualization and internet delivery of services, dynamic provision of reconfigurable resources and on – demand operations. Cloud Computing is continuously growing and showing consistent growth in the field of computing. The major challenging task in cloud computing is the security and privacy issues caused by the outsourcing of infrastructure, sensitive data and critical applications and its multi- tenancy nature. The security for Cloud Computing is emerging area for research work and this paper discusses various types of authentication methods and multi-factor user authentication.

References

P. Barham et al., Xen and the Art of Virtualization, Proc. ACM Symposium on Operating Systems, Bolton Landing, NY, October 19–22, 2003.

M.N. Bennani and D.A. Menasc´e, Resource Allocation for Autonomic Data Centers Using Analytic Performance Models, Proc. 2005 IEEE International Conference on Autonomic Computing, Seattle, WA, June 13-16, 2005

R.J. Creasy, Digital Certificate Authentication, IBM J. Research and Development, Sept. 1981, pp. 483–490.

R. Figueiredo, P.A. Dinda, and J. Fortes, Cloud services, IEEE Internet Computing, May 2005, Vol. 38, No. 5.

R.P. Goldberg, Survey of Virtual Machine Research for Authentication, IEEE Computer, June 1974, pp.34–44

G.J. Popek and R.P. Goldberg, Formal Requirements for Cloud Architectures, Comm. ACM, July 1975, pp. 412–421.

D.A. Menasc´e, V.A.F. Almeida, and L.W. Dowdy, Performance by Design: Computer Capacity Planning by Example, Prentice Hall, Upper Saddle River, 2004.

M. Rosenblum and T. Garfinkel, Virtual Machine Monitors: Current Technology and Future Trends, IEEE Internet Computing, May 2005, Vol. 38, No. 5.

R. Uhlig et. al., Microsoft Cloud Technology, IEEE Internet Computing, May 2005, Vol. 38, No. 5.

A. Whitaker, R.S. Cox, M. Shaw, and S.D. Gribble,-Rethinking the Design of Virtual Machine Monitors, IEEE Internet Computing, May 2005, Vol. 38, No. 5

Downloads

Published

2014-10-31

How to Cite

[1]
S. Rajesh Telrandhe and D. Kapgate, “Authentication Model on Cloud Computing”, Int. J. Comp. Sci. Eng., vol. 2, no. 10, pp. 33–37, Oct. 2014.