A Security Auditing Scheme for Cloud Access Control |
Author(s): |
Juber Mirza , SVITS Indore; Avdesh Kumar Sharma, SVITS Indore |
Keywords: |
Cloud Computing, Security, Authentication, Survey, Password Management |
Abstract |
The use of cloud computing and their relevant technology is growing rapidly. Due to this the need of new techniques for security and authentication is also rises in similar manner. In this presented paper a survey on the different existing techniques of authentication is explored and a new technique for securing the data storage of cloud server is proposed. The main aim of the proposed paper is review the different authentication schemes and recover most optimum technique for enhancing the ability of authorized persons data and sensitive information. The need of merchantable computing and storage switch the users to consume the services of cloud. Cloud computing technology provides both the prospective of computing. On one side it provides ease in computing new manner but the traditional manner of security is not much promising to work with it. Therefore need to enhance the security aspects of the cloud computing. In order to provide the effective security in computational cloud the proposed work is intended to find an optimized way of security using authentication and access control methodology. Thus a new security auditing scheme is investigated and try to evolve for improving the security over the cloud storage data access. |
Other Details |
Paper ID: IJSRDV4I40947 Published in: Volume : 4, Issue : 4 Publication Date: 01/07/2016 Page(s): 1000-1004 |
Article Preview |
|
|