Identity Security Using Authentication and Authorization in Cloud Computing

Abstract

The Growth of the Cloud Computing invention suggests attractive and innovative computing services through resource pooling and virtualization techniques. Cloud gives delivers different types of Computing Services to their consumers according to their pay per usage of economic model. Anyhow this new technology introduces new immerse for enterprises and bussiness admired their security and privacy. The new cloud services are Security as a service (Saas). This model is mainly for Security enhancemet of a cloud environment. This is a way of gathering security solution under the control of security specialists. Identify and Access control services are the area of security, and sometimes are presented under the term identiy as a service.

Authors and Affiliations

D. Ranjith , J. Srinivasan

Keywords

Related Articles

Implication of Cell Phone Usage on Study Patterns of Teens

Cell phone usage has become worldwide commodity for every person regardless of their ages. Over the years, teenagers within the age bracket of thirteen to nineteen are more vulnerable towards the use of the technology in...

Improved Design of Low Power TPG Using LP-LFSR

This paper presents a novel test pattern generator which is more suitable for built in self test (BIST) structures used for testing of VLSI circuits. The purpose of the BIST is to reduce power dissipation without affecti...

A Psychological Approach in Acquiring Second Language

The learning of English language in schools or colleges proves to be a tough task in which it often doesn’t give the satisfactory result. Since the young people spend years of time in studying the English language, they...

Preprocessing and Enhancement for Mammogram Images Using Unified Approach

Breast cancer is one of the foremost causes for the increase in mortality among women, especially in developed countries. Micro-classifications in breast tissue is one of the most incident signs considered by radiologist...

Competitive Advantage through Business Intelligence for E-Commerce

In today’s competitive business world it is certain that there is lot of data to be processed. It is essential for the business organization to analyze and comprehend the generated data for the performance of the organiz...

Download PDF file
  • EP ID EP104575
  • DOI -
  • Views 99
  • Downloads 0

How To Cite

D. Ranjith, J. Srinivasan (2013). Identity Security Using Authentication and Authorization in Cloud Computing. International Journal of Computer & organization Trends(IJCOT), 3(4), 122-129. https://europub.co.uk/articles/-A-104575