Please use this identifier to cite or link to this item: http://13.232.72.61:8080/jspui/handle/123456789/480
Title: Trusted Third Party Authentication in Cloud Computing.
Authors: Nair, Susmita J. A.
Anitha, K. L.
Kamala, Rosita F.
Keywords: Computer science
Computer networks
Computer configuration
Issue Date: Nov-2013
Publisher: IJERT
Citation: Nair, Susmita J. A., Anitha, K., & Kamala, Rosita F. (2013). Trusted Third party Authentication in cloud computing. International journal of Engineering Research and Technology. 2(11), 354-358.
Abstract: Cloud computing is an emerging approach in the field of distributed computing that provides web based services, computation and storage for the community(including business, healthcare and government). The customers are offered dynamically scalable resources and thus the cloud users are economically benefited to a large extent. However, security is a huge concern for cloud user. Some of the areas of security concern in cloud computing are: stored data, data during transmission, user authentication etc. In cloud environment anyone can access the data over the internet. Hence user authentication and access control is very important in the cloud. Trusted third parties are independent service providers and are assumed to have a certain level of trust. The trusted third party facilitates secure communication between two parties who trust this third party. The cloud service providers have the control of the user data and the computational resources. The trusted third party ensures the integrity of the stored data.
URI: http://13.232.72.61:8080/jspui/handle/123456789/480
ISSN: 2278-0181
Appears in Collections:Articles

Files in This Item:
File Description SizeFormat 
Trusted Third Party Authentication in Cloud Computing.pdf546.13 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.