期刊名称:International Journal of Innovative Research in Science, Engineering and Technology
印刷版ISSN:2347-6710
电子版ISSN:2319-8753
出版年度:2017
卷号:6
期号:12
页码:22291
DOI:10.15680/IJIRSET.2017.0612008
出版社:S&S Publications
摘要:Cloud computing is a cost-effective, scalable and flexible model. It provides network services to a rangeof users including individual and business over the Internet. It has brought the revolution in the era of traditionalmethod of storing and sharing of resources. It provides a variety of benefits to its users such as effective and efficientuse of dynamically allocated shared resources, economics of scale, availability of resources etc. A new concept, Cloudcomputing, uses low-power hosts to achieve high quality service. However, the authentication is one of the importantproblems in Cloud computing environment.Security and privacy are major challenges in cloud computing. Various malicious activities from illegal userssuch as data misuse, strict access control and limited checking may result into harmful or illegal access of critical andprivate data of these cloud users. In this work, brief view of user authentication techniques in cloud computingenvironment is stated. Authentication and authorization for data access on cloud is more than a necessity.UsingShamir’s secret sharing to secure authentication on cloud for single user is most efficient way