2016
DOI: 10.14257/ijgdc.2016.9.10.18
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of User Authentication as a Service for Cloud Network

Abstract: There are so many security risks for the users of cloud computing, but

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…The most important types of cloud services are, Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS), which is illustrated in Figure 3. These services provide services to users based on different Cloud deployment models, namely, Private, Public, and Hybrid Cloud [12]. There are many benefits of Cloud Computing mentioned by earlier studies [13], [14], [15] as follows:…”
Section: Cloud Computingmentioning
confidence: 99%
“…The most important types of cloud services are, Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS), which is illustrated in Figure 3. These services provide services to users based on different Cloud deployment models, namely, Private, Public, and Hybrid Cloud [12]. There are many benefits of Cloud Computing mentioned by earlier studies [13], [14], [15] as follows:…”
Section: Cloud Computingmentioning
confidence: 99%
“…Versatile clients dependably expect broadband Internet get to wherever they go, communicate with each other employing informal organizations while moving; besides, they are looking for omnipresent access to an abundance of media-based substance and administrations. Since cell phones are resource limited naturally, it is necessary for the cloud to give computational help to numerous media-rich applications with authentication [4]. The mix of versatile media and distributed computing very emerges various specialized difficulties, and the central pressure between asset hungry interactive media streams and power-constrained cell phones exists.…”
Section: Introductionmentioning
confidence: 99%
“…If an attacker who gets unauthorized access to a device that is dual connected, then that particular user is in a position to attack and access wired network resources [22]. In addition, the organizations should also consider the other forms of threats that evolve as a result of involving multiple wireless networks rather than catering and focusing on the threats that emerge due to dual connections.…”
Section: Introductionmentioning
confidence: 99%