Comparative Analysis of Various Authentication Techniques in Cloud Computing

Over the recent years, there is a great advancement in the field of Computer Science. Cloud Computing is the result of advancement in the existing technologies. It shares the characteristics with Autonomic Computing, Client-Server Model, Grid Computing, Mainframe Computer, Utility Computing, Peer-to-Peer and Cloud Gaming. Cloud Computing is beneficial not only for users but also for large and small organizations. Security issues are the major concern in Cloud Computing. In this paper, the authors' focus is on the authentication techniques used for verifying the client identity to the Cloud Broker.

Provided by: Lovely Professional University Topic: Cloud Date Added: Apr 2013 Format: PDF

Download Now

Find By Topic