Adopting Trusted Third Party Services for Multi-Level Authentication Accessing Cloud

Cloud computing is an emerging, on-demand and internet-based technology. It provides variety of services over internet such as, software, hardware, data storage and infrastructure. This technology has been used by worldwide customers to improve their business performance. At present, authentication is done in several ways: such as, textual, graphical, bio-metric, 3D password and third party authentication. In this paper aims at identifying SLA based information security metrics relevant in cloud computing. In this research investigates different Objects relevant in cloud policy models and each of them can be used as a component in the proposed framework. A role represents a specific function within an organization and can be seen as a set of actions or responsibilities associated with this function.

Provided by: IJCER Topic: Cloud Date Added: Dec 2012 Format: PDF

Find By Topic