Authentication, Access Control, VM Allocation and Energy efficiency towards Securing Computing Environments in Cloud Computing
Main Article Content
Over the past decades, huge attention has been gained by the cloud computing due to endlessly increasing demands. Organizations gain benefits for evolving toward the data storage solutions which are based on cloud. Some of them are basic IT infrastructure and organization, effective remote access with internet and the cost efficiencies that cloud computing can get. Further exploration is needed in cloud for the related privacy and security challenges. Researchers in the formerly published studies have offered potential solutions to these challenges. Associated to this technology many benefits are available such as cost effectiveness, unlimited storage requiring robust access control and authentication process. The security issue of cloud such as integrity, authenticity and confidentiality are engaged by many researchers. In Cloud computing, to offer the necessary trust and privacy, there is a need to emphasis on threats, authentication and access control methods along withother techniques. This study presents a review and taxonomy, for the existing authentication and access control concerns in the perspective of the cloud computing paradigm.