Authentication methods in cloud computing: a survey
The study focuses on presenting a review on the various biometric authentication mechanisms in the cloud computing environment. Cloud Computing is used to deliver computing Services over the internet and is used to store data in cloud servers. Due to the sharing of services, privacy and data securit...
Saved in:
Main Authors: | Padma, P., Srinivasan, Sumana V. |
---|---|
Format: | Article |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2015
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/57925/ http://dx.doi.org/10.1109/INVENTIVE.2016.7823273 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Cloud cognitive authenticator (CCA): a public cloud computing authentication mechanism
by: Jivanadham, L. B., et al.
Published: (2013) -
Trusted computing strengthens cloud authentication
by: Ghazizadeh, Eghbal, et al.
Published: (2014) -
Survey on method of encryption in cloud computing
by: Babaeizadeh, Mahnoush, et al.
Published: (2016) -
Keystroke dynamic authentication in mobile cloud computing
by: Babaeizadeh, Mahnoush, et al.
Published: (2014) -
Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
by: Lim, Tsu Chean, et al.
Published: (2018)