Review of access control mechanisms in cloud computing

Cloud Computing is an evolving technology in the field of IT. People are using this technology vastly as it reduces the storage and other services burden of the users as they use the services provided by the cloud. There are many advantages related to this technology like unlimited storage, cost eff...

Full description

Saved in:
Bibliographic Details
Main Authors: Muhammad Rizwan, Ghori, Ahmed, Abdulghani Ali
Format: Conference or Workshop Item
Language:en
Published: Institute of Physics Publishing 2018
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/22896/1/Review%20of%20access%20control%20mechanisms%20in%20cloud%20computing.pdf
http://umpir.ump.edu.my/id/eprint/22896/
https://iopscience.iop.org/article/10.1088/1742-6596/1049/1/012092/pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1831525936060694528
author Muhammad Rizwan, Ghori
Ahmed, Abdulghani Ali
author_facet Muhammad Rizwan, Ghori
Ahmed, Abdulghani Ali
author_sort Muhammad Rizwan, Ghori
building UMPSA Library
collection Institutional Repository
content_provider Universiti Malaysia Pahang Al-Sultan Abdullah
content_source UMPSA Institutional Repository
continent Asia
country Malaysia
description Cloud Computing is an evolving technology in the field of IT. People are using this technology vastly as it reduces the storage and other services burden of the users as they use the services provided by the cloud. There are many advantages related to this technology like unlimited storage, cost effectiveness but lacking the strong authentication process. Many researchers are working on the security issue of cloud like user confidentiality, integrity and authenticity etc. However, in this paper we have reviewed and discussed several papers that are related to the authentication in cloud environment. Moreover, after studying different authentication system made by the researchers, we have critically analysed them and found advantages and disadvantages along with some suggestions for the future work.
format Conference or Workshop Item
id my.ump.umpir.22896
institution Universiti Malaysia Pahang
language en
publishDate 2018
publisher Institute of Physics Publishing
record_format eprints
spelling my.ump.umpir.228962019-06-11T04:54:01Z http://umpir.ump.edu.my/id/eprint/22896/ Review of access control mechanisms in cloud computing Muhammad Rizwan, Ghori Ahmed, Abdulghani Ali QA76 Computer software Cloud Computing is an evolving technology in the field of IT. People are using this technology vastly as it reduces the storage and other services burden of the users as they use the services provided by the cloud. There are many advantages related to this technology like unlimited storage, cost effectiveness but lacking the strong authentication process. Many researchers are working on the security issue of cloud like user confidentiality, integrity and authenticity etc. However, in this paper we have reviewed and discussed several papers that are related to the authentication in cloud environment. Moreover, after studying different authentication system made by the researchers, we have critically analysed them and found advantages and disadvantages along with some suggestions for the future work. Institute of Physics Publishing 2018-07 Conference or Workshop Item PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/22896/1/Review%20of%20access%20control%20mechanisms%20in%20cloud%20computing.pdf Muhammad Rizwan, Ghori and Ahmed, Abdulghani Ali (2018) Review of access control mechanisms in cloud computing. In: International PostGraduate Conference on Applied Science and Physics, GRASP 2017 , 7 December 2017 , UTHM Johor, Malaysia. pp. 1-9., 1049 (1). ISSN 1742-6588 (Print); 1742-6596 (Online) (Published) https://iopscience.iop.org/article/10.1088/1742-6596/1049/1/012092/pdf
spellingShingle QA76 Computer software
Muhammad Rizwan, Ghori
Ahmed, Abdulghani Ali
Review of access control mechanisms in cloud computing
title Review of access control mechanisms in cloud computing
title_full Review of access control mechanisms in cloud computing
title_fullStr Review of access control mechanisms in cloud computing
title_full_unstemmed Review of access control mechanisms in cloud computing
title_short Review of access control mechanisms in cloud computing
title_sort review of access control mechanisms in cloud computing
topic QA76 Computer software
url http://umpir.ump.edu.my/id/eprint/22896/1/Review%20of%20access%20control%20mechanisms%20in%20cloud%20computing.pdf
http://umpir.ump.edu.my/id/eprint/22896/
https://iopscience.iop.org/article/10.1088/1742-6596/1049/1/012092/pdf
url_provider http://umpir.ump.edu.my/