Abstract-Authentication is an important topic in cloud computing security. That is why various authentication techniques in cloud environment are presented in this paper. This process serves as a protection against different sorts of attacks where the goal is to confirm the identity of a user and the user requests services from cloud servers. Multiple authentication technologies have been put forward so far that confirm user identity before giving the permit to access resources. Each of these technologies (username and password, multi-factor authentication, mobile trusted module, public key infrastructure, single sign-on, and biometric authentication) is at first described in here. The different techniques presented will then be compared.Keywords-Cloud computing, security, authentication, access control,
I. INTRODUCTIONWith the rapid growth of storage technology and the success of the Internet, computer resources have become cheaper and more powerful than before and they may be found everywhere. This trend gave rise to a new topic, namely cloud computing, where the resources (e.g. CPU and memory) can be utilized by users and the Internet as a public tool, considering the requirements, and they may later be given back. In a cloud computing environment, the traditional role of service providers may be divided into two parts: infrastructure providers that manage the cloud platform and rent and retrieve resources given the cost model according to the use, and service providers that rent resources from one infrastructure provider or more to deliver to end customers. The emergence of cloud computing has substantially affected IT topics in recent years. In fact, cloud computing provides job owners with attractive advantages including reduced practical costs, high scalability, easy accessibility, and reduced business risk and maintenance costs.Considering the ever-increasing growth in the use of cloud services and the tendency of users to adopt this service, the hackers also began to focus on this service simultaneously. The word cloud initially implied the storage of user data in a location provided by a third party. That is, information was not stored on the user's computer hard drive and it was stored elsewhere which was accessible at all times and in every place. The user was able to access the information at any location. Despite its numerous advantages, this method also has disadvantages. For instance, how would a company agree to store its sensitive information at a location other than its own storage devices, where the company does not know who can access the aforesaid information? That is why different threats and security mechanisms were developed. As you know, in the majority of cases where security is breached, the goal is to destroy the confidentiality of information, data accuracy, and information accessibility. Given brute force attacks, the username and password mechanism was demonstrated to be poor more than ever. Organizations and people expect different security parameters to be employed for increasin...