DocumentCode
3667809
Title
Access control and user authentication concerns in cloud computing environments
Author
Mohammad Ahmadi;Milad Chizari;Mohammad Eslami;Mohammad Javad Golkar;Mostafa Vali
Author_Institution
Faculty of Computing, Asia Pacific University of Technology and Innovation, Kuala Lumpur, Malaysia
fYear
2015
fDate
5/1/2015 12:00:00 AM
Firstpage
39
Lastpage
43
Abstract
Cloud computing is a newfound service that has a rapid growth in IT industry during recent years. Despite the several advantages of this technology there are some issues such as security and privacy that affect the reliability of cloud computing models. Access control and user authentication are the most important security issues in cloud computing. Therefore, the research has been prepared to provide the overall information about this security concerns and specific details about the identified issues in access control and user authentication researches. Therefore, cloud computing benefits and disadvantages have been explained in the first part. The second part reviewed some of access control and user authentication algorithms and identifying benefits and weaknesses of each algorithm. The main aim of this survey is considering limitations and problems of previous research in the research area to find out the most challenging issue in access control and user authentication algorithms.
Keywords
"Access control","Cloud computing","Computational modeling","Authentication","Encryption","Servers"
Publisher
ieee
Conference_Titel
Telematics and Future Generation Networks (TAFGEN), 2015 1st International Conference on
Type
conf
DOI
10.1109/TAFGEN.2015.7289572
Filename
7289572
Link To Document