Abstracto

COMPARATIVE ANALYSIS OF VARIOUS AUTHENTICATION TECHNIQUES IN CLOUD COMPUTING

Shabnam Sharma, Usha Mittal

Over the recent years, there is a great advancement in the field of Computer Science. Cloud Computing is the result of advancement in the existing technologies. It shares the characteristics with Autonomic Computing, Client- Server Model, Grid Computing, Mainframe Computer, Utility Computing, Peer-to-Peer and Cloud Gaming. Cloud Computing is beneficial not only for users but also for large and small organizations. Security issues are the major concern in Cloud Computing. In this paper, our focus is on the authentication techniques used for verifying the client identity to the Cloud Broker.

Descargo de responsabilidad: este resumen se tradujo utilizando herramientas de inteligencia artificial y aún no ha sido revisado ni verificado.

Indexado en

Academic Keys
ResearchBible
CiteFactor
Cosmos SI
Búsqueda de referencia
Universidad Hamdard
Catálogo mundial de revistas científicas
director académico
Factor de impacto de revistas innovadoras internacionales (IIJIF)
Instituto Internacional de Investigación Organizada (I2OR)
Cosmos

Ver más