In cloud, the data sharing is the most important functionality that has to be done securely and efficiently. Demands on data outsourcing to third party leads to the foundation of cloud computing. Cloud storage supports the confidentiality, integrity, and availability of data. Cloud storage not only meant for storing data but also shares those data across multiple users. Authentication is the most essential procedure to ensure the cloud data in a secured manner. However, strong user authentication is the main requirement for cloud computing that reduces the unauthorized user access of data on cloud. Data security is a more important issue of cloud computing. Thus, the need to ensure the safety of information that being exchanged between the users and the cloud became more significant. Many security and authentication techniques have been proposed to secure the exchanged data. These techniques aim to keep the authentication, privacy and reliability levels of data.
Article Details
Unique Paper ID: 145559
Publication Volume & Issue: Volume 4, Issue 10
Page(s): 774 - 777
Article Preview & Download
Share This Article
Join our RMS
Conference Alert
NCSEM 2024
National Conference on Sustainable Engineering and Management - 2024