Comparative Analysis of Various Authentication Techniques in Cloud Computing

Download Now
Provided by: Lovely Professional University
Topic: Cloud
Format: PDF
Over the recent years, there is a great advancement in the field of Computer Science. Cloud Computing is the result of advancement in the existing technologies. It shares the characteristics with Autonomic Computing, Client-Server Model, Grid Computing, Mainframe Computer, Utility Computing, Peer-to-Peer and Cloud Gaming. Cloud Computing is beneficial not only for users but also for large and small organizations. Security issues are the major concern in Cloud Computing. In this paper, the authors' focus is on the authentication techniques used for verifying the client identity to the Cloud Broker.
Download Now

Find By Topic