ijarce.org

Journal Archive

    1. Number 1
    1. Number 2
    2. Number 1

NEWS AND EVENTS

29 November 2016

Attention to Authors

The Volume 1, Number 2, November 2016 issue of IJARCE has been published and hardcopies have been sent to authors. Notice that, arrival process of the hardcopies, to your addresses, will takes between 12 to 30 days depending on your country of origin.

 

10 October 2016

Attention to Authors

The Volume 1, Number 1, September 2016 issue of IJARCE has been published and hardcopies have been sent to authors. Notice that, arrival process of the hardcopies, to your addresses, will takes between 5 to 30 days depending on your country of origin.

- -

Multi-Level Authentication in Cloud Computing: A Review

Artical 14 ; volume1 ; number2 ; Page: 50-56 ; PDF Download

Authors

Mitra Khanjari Japelaghi, Zohreh Bateni, Reza Ravanmehr

Department of Computer Engineering, Central Tehran Branch, Islamic Azad University, Tehran, Iran.

Abstract

Cloud computing is a scalable and distributed computing environment which a large collection of virtual computing resources, variety of infrastructure and software are offered to customers via the Internet as a service. Nowadays cloud computing due to reducing costs, high flexibility and expandability is one of the most attractive technologies in the world, but in the meantime users' privacy and data security is very essential and critical in cloud environment. The purpose of this paper is to check users’ authentication in the service layer as one of the most effective solutions for increasing the security in cloud computing. In general, the purpose of authentication is to ask permission of users and lack of unauthorized access to the cloud environment. In fact, this is a process of identification, authentication, allowing users to enter the system, which consists of two identification and authentication phases. Identification is responsible for the users’ authentication. This identification is often defined as a username for the system, and it recognizes users through it. There are several ways to authenticate in the cloud environment. Each authentication model has its own methods and unreliability. In this paper, for the data security and identifying the users authorized to enter the cloud environment we will study cloud multi-level authentication and data cryptography.

Statistics

Article View : 1170

PDF Download : 508

Keyword