Identity Security Using Authentication and Authorization in Cloud Computing

Abstract

The Growth of the Cloud Computing invention suggests attractive and innovative computing services through resource pooling and virtualization techniques. Cloud gives delivers different types of Computing Services to their consumers according to their pay per usage of economic model. Anyhow this new technology introduces new immerse for enterprises and bussiness admired their security and privacy. The new cloud services are Security as a service (Saas). This model is mainly for Security enhancemet of a cloud environment. This is a way of gathering security solution under the control of security specialists. Identify and Access control services are the area of security, and sometimes are presented under the term identiy as a service.

Authors and Affiliations

D. Ranjith , J. Srinivasan

Keywords

Related Articles

Intrusion Detection System Using Fuzzy Inference System

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access or denial of a computer network and network accessible resources. Intrusions are the...

A Survey Of Key Management Schemes In Wireless Sensor Networks

In near future, the Wireless Sensor Networks (WSN) is widely used in many applications like military and civil domains. The wireless sensor networks are always deployed in hostile and pervasive environment. Security is m...

FPGA based implementation of Interoperability of Wireless mesh Network and Wi-Fi

Wireless Mesh Networks (WMNs) is a key technology for next generation wireless networks, showing rapid progress and many new inspiring applications. IEEE 802.11s is the standard defined for WLAN mesh networks.One importa...

Precision-Aware and Quantization of Lifting Based DWT Hardware Architecture

This paper presents precision-aware approaches and associated hardware implementations for performing the DWT. By implementing BP architecture and also presents DS design methodologies. These methods enable use of an opt...

Escape Time Fractals of Inverse Tangent Function

The generation of fractals and study of the dynamics of transcendental function is one of emerging and interesting field of research nowadays. We introduce in this paper the complex dynamics of inverse tangent function f...

Download PDF file
  • EP ID EP104575
  • DOI -
  • Views 92
  • Downloads 0

How To Cite

D. Ranjith, J. Srinivasan (2013). Identity Security Using Authentication and Authorization in Cloud Computing. International Journal of Computer & organization Trends(IJCOT), 3(4), 122-129. https://europub.co.uk/articles/-A-104575