User Authentication in Cloud Computing
暂无分享,去创建一个
As Cloud Computing has been spreading widely, users and service providers enables to use resource or service cheaply and easily without owning all the resource needed. However, Cloud Computing has some security issues such as virtualization technology security, massive distributed processing technology, service availability, massive traffic handling, application security, access control, and authentication and password. User authentication among them requires a high-quranteed security. Hence, this paper would like to discuss technologies of access contol and user authentication briefly and look at the problems inside.
[1] Marios D. Dikaiakos,et al. Cloud Computing: Distributed Internet Computing for IT and Scientific Research , 2009, IEEE Internet Computing.
[2] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[3] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.
[4] Elisa Bertino,et al. Privacy-preserving Digital Identity Management for Cloud Computing , 2009, IEEE Data Eng. Bull..