1 research outputs found

    Study of Authentication and Authorization in Cloud Computing

    Get PDF
    Cloud Computing is aconvenient model for on-demand network. Cloud Computing (CC) refers to applications & services which we can run on a distributed network. This Network use hosted services and virtualized resources delivered over the internet. Cloud computing is characterized into two main categories(a) Virtualization– As the network has no limit resources are virtual and limitless.(b)Abstraction–All details of physical systems which run the software are abstracted from users.There are three categories of Cloud Computing: (a) Infrastructure-as-a-Service (IaaS), (b) Platform-as-a-Service (PaaS) and (c) Software-as-a-Service (SaaS). The data we are storing on CC must be safe and secure then only users will trust on this environment. Access Controls for file and directory, Flex list Models, SLAs etc are some of the facilities available for this. But still there are some drawbacks in security. When users access data from CC, Authorization and Authentication are very important. We call this as first stage of Security. This paper focuses on Authentications and Authorizations in CC
    corecore