Authentication Model on Cloud Computing
Keywords:
Cloud Computing, Security Issues, Cloud Computing Layers, Architecture diagram of AMOCCAbstract
Cloud computing is an internet-based computing, where a set of resources and services such as applications, Storage and servers are delivered to computers and devices through the Internet. It incorporates large open distributed system, virtualization and internet delivery of services, dynamic provision of reconfigurable resources and on – demand operations. Cloud Computing is continuously growing and showing consistent growth in the field of computing. The major challenging task in cloud computing is the security and privacy issues caused by the outsourcing of infrastructure, sensitive data and critical applications and its multi- tenancy nature. The security for Cloud Computing is emerging area for research work and this paper discusses various types of authentication methods and multi-factor user authentication.
References
P. Barham et al., Xen and the Art of Virtualization, Proc. ACM Symposium on Operating Systems, Bolton Landing, NY, October 19–22, 2003.
M.N. Bennani and D.A. Menasc´e, Resource Allocation for Autonomic Data Centers Using Analytic Performance Models, Proc. 2005 IEEE International Conference on Autonomic Computing, Seattle, WA, June 13-16, 2005
R.J. Creasy, Digital Certificate Authentication, IBM J. Research and Development, Sept. 1981, pp. 483–490.
R. Figueiredo, P.A. Dinda, and J. Fortes, Cloud services, IEEE Internet Computing, May 2005, Vol. 38, No. 5.
R.P. Goldberg, Survey of Virtual Machine Research for Authentication, IEEE Computer, June 1974, pp.34–44
G.J. Popek and R.P. Goldberg, Formal Requirements for Cloud Architectures, Comm. ACM, July 1975, pp. 412–421.
D.A. Menasc´e, V.A.F. Almeida, and L.W. Dowdy, Performance by Design: Computer Capacity Planning by Example, Prentice Hall, Upper Saddle River, 2004.
M. Rosenblum and T. Garfinkel, Virtual Machine Monitors: Current Technology and Future Trends, IEEE Internet Computing, May 2005, Vol. 38, No. 5.
R. Uhlig et. al., Microsoft Cloud Technology, IEEE Internet Computing, May 2005, Vol. 38, No. 5.
A. Whitaker, R.S. Cox, M. Shaw, and S.D. Gribble,-Rethinking the Design of Virtual Machine Monitors, IEEE Internet Computing, May 2005, Vol. 38, No. 5
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
