International Journal of Inventive Engineering and Sciences (IJIES)
Cloud computing is emerging field because of its performance, high availability, least cost and many others. Besides this companies are binding there business from cloud computing because the fear of data leakage. Due to lack of proper security control policy and weakness in safeguard which lead to many vulnerability in cloud computing. When organizations utilize cloud services, authenticating users in a trustworthy and manageable manner is a vital requirement. Organizations must address authentication related challenges such as credential management, strong authentication, delegated authentication, and managing trust across all types of cloud services.