2015 1st International Conference on Telematics and Future Generation Networks (TAFGEN) 2015
DOI: 10.1109/tafgen.2015.7289572
|View full text |Cite
|
Sign up to set email alerts
|

Access control and user authentication concerns in cloud computing environments

Abstract: Cloud computing is a newfound rapid growth in IT industry during recent several advantages of this technology there ar as security and privacy that affect the r computing models. Access control and user aut most important security issues in cloud com the research has been prepared to pro information about this security concerns a about the identified issues in access c authentication researches. Therefore, cloud c and disadvantages have been explained in t second part reviewed some of access c authentication a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Real difficulties looked as far as security and protection on the cloud have been talked about. Ahmadi et al [16] additionally expressed that except for a few advantages, distributed computing needs to manage genuine concerns like protection and security. Access control and customer verification are important for giving access to the cloud.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Real difficulties looked as far as security and protection on the cloud have been talked about. Ahmadi et al [16] additionally expressed that except for a few advantages, distributed computing needs to manage genuine concerns like protection and security. Access control and customer verification are important for giving access to the cloud.…”
Section: Literature Reviewmentioning
confidence: 99%
“…It may be caused by the authorized (insiders) as well as the unauthorized users. Management of user authentication and access control is most challenging in public and private clouds [7].The access control and user authentication procedures were identified as two of the most important parts of security issues [8].…”
Section: Credential and Access Managementmentioning
confidence: 99%
“…In this article, the approaches that have been used for the access control mechanism are classified into categories. The second section presents the classification according to the operation techniques [3][4][5]. In addition, the access control mechanisms that have been used in older generation servicebased architectures and adapted to current conditions, the approaches that are designed according to the dynamic structure owned by cloud computing are also discussed.…”
Section: Introductionmentioning
confidence: 99%