期刊名称:International Journal of Computer Science & Technology
印刷版ISSN:2229-4333
电子版ISSN:0976-8491
出版年度:2013
卷号:4
期号:2
页码:614-617
语种:English
出版社:Ayushmaan Technologies
摘要:Cloud computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsource their large computation workloads to the cloud, and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in a pay-per-use manner. Cloud storage moves the user’s data to large data centers, which are remotely located, on which user does not have any control. This unique feature of the cloud poses many new security challenges which need to be clearly understood and resolved. A key area in security research is authentication. Authentication means to check the identity of the user, which means whether the person is same which he pretends to be. This paperpresents overview of different authentication methods and then proposes a scheme in which authentication process is carried out in two levels or two tiers. The advantage of this work is that it does not require any additional hardware and software. So this can be used and accessed from anywhere across the globe.