{"title":"云计算环境下的各种认证方案综述","authors":"M. Kaur, Amit Verma, Iqbaldeep Kaur, Dolly Sharma","doi":"10.1109/ISPCC.2017.8269650","DOIUrl":null,"url":null,"abstract":"Cloud computing is basically excogitated from the word internet, which is an advance technology. Cloud computing enables us to access services and infrastructure over the cloud through internet and also permits secure sharing of resources. The use of computing resources as a service with the help of internet is called Cloud Computing. It has started to gain vision in corporate data centers. In recent years, cloud computing is including grid computing because utilization of virtualization at data center could increase. With increase in the number of user and data, there is a need of data confidentiality as well as authenticity of users connected to the cloud so as to protect them from each other as well as from the hackers too.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Review on various authentication scheme over cloud computing\",\"authors\":\"M. Kaur, Amit Verma, Iqbaldeep Kaur, Dolly Sharma\",\"doi\":\"10.1109/ISPCC.2017.8269650\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is basically excogitated from the word internet, which is an advance technology. Cloud computing enables us to access services and infrastructure over the cloud through internet and also permits secure sharing of resources. The use of computing resources as a service with the help of internet is called Cloud Computing. It has started to gain vision in corporate data centers. In recent years, cloud computing is including grid computing because utilization of virtualization at data center could increase. With increase in the number of user and data, there is a need of data confidentiality as well as authenticity of users connected to the cloud so as to protect them from each other as well as from the hackers too.\",\"PeriodicalId\":142166,\"journal\":{\"name\":\"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)\",\"volume\":\"150 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISPCC.2017.8269650\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPCC.2017.8269650","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Review on various authentication scheme over cloud computing
Cloud computing is basically excogitated from the word internet, which is an advance technology. Cloud computing enables us to access services and infrastructure over the cloud through internet and also permits secure sharing of resources. The use of computing resources as a service with the help of internet is called Cloud Computing. It has started to gain vision in corporate data centers. In recent years, cloud computing is including grid computing because utilization of virtualization at data center could increase. With increase in the number of user and data, there is a need of data confidentiality as well as authenticity of users connected to the cloud so as to protect them from each other as well as from the hackers too.