SP Otta, S Kolipara, VK Malhotra… - … and Networks (CINE …, 2022 - ieeexplore.ieee.org
Designing any cloud-based application typically includes a vital step for securing user identification and access control. A potential approach to increase security against mali …
Now a days Cloud computing is an upcoming Technology. Cloud allows users to access and share resources such as software, platform and infrastructure by means of virtualization …
KK Liyanaarachchi - IEEE Potentials, 2018 - ieeexplore.ieee.org
Cloud services are very popular among enterprises; most businesses use multiple cloud services. At the same time, some enterprises acquire, merge, and partner with other …
With promising benefits, cloud computing has also the issue of privacy and security, which is related to need for enabling access control to only authorize a user. Knowing that it has …
Z Khudoykulov, A Karimov… - … on Electronics and …, 2023 - ieeexplore.ieee.org
An authentication mechanism plays an essential role in access control. Authentication methods vary depending on the environment used, and many authentication methods are …
MR Momeni - International Journal of Computer Science and …, 2014 - academia.edu
The ABI Research believes that the number of mobile cloud computing users is expected to grow from 42.8 million (1.1% of total mobile users) in 2008 to 998 million (19% of total …
A Sharma, B Keshwani, P Dadheech - Proceedings of International …, 2019 - papers.ssrn.com
Cloud Computing is a service which is rapidly increasing its growth in IT industry in recent years. The privacy and security is main challenging issue for the cloud users as well …