High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

User Authentication in Cloud:A New Approach


Miss. Sayali M. Jawake , JDIET, YAVATMAL; Vasundhara V. Bhele, JDIET, YAVATMAL; Snehal P. Deulkar, JDIET, YAVATMAL; Mayuri P. Kawalkar, JDIET, YAVATMAL; Sonal R. Jathe, JDIET, YAVATMAL


Authentication, Security, Privacy, Cloud Services


Cloud Computing has been imagined as the next-generation architecture of IT Enterprise. In cloud computing application software and databases are moving to the centralized large data centers. This mechanism brings about many new challenges, which have not been well understood. Security and protecting concerns, however, are among the top concerns standing in the way of wider adoption of cloud. In cloud computing the main concern is to provide the security to end user to protect files or data from unauthorized user. Security is the main intention of any technology through which unauthorized intruder can't access your file or data in cloud. In this paper we analyzed a three method preserving cloud computing privacy architecture, authentication architecture, Cloud information accountability (CIA) system. The proposed model increases the security at the security access point level of cloud computing and status monitor system with data log mechanism. This system ensures the user by keeping user’s data privacy giving access policies. And log mechanism contain the user policy according to that user has benefit to access services and data in cloud.

Other Details

Paper ID: IJSRDV5I30006
Published in: Volume : 5, Issue : 3
Publication Date: 01/06/2017
Page(s): 1-3

Article Preview

Download Article