UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 13 | Issue 3 | March 2026

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 9 Issue 8
August-2022
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2208310


Registration ID:
501361

Page Number

d75-d81

Share This Article


Jetir RMS

Title

A Survey on Different Authentication techniques used for Improving Security

Abstract

Cloud computing is a popular topic in the IT industry, but not much is known about the risks that come with this new technology and delivery model. Because cloud computing has a lot of useful features, many organizations use cloud storage to store their important data. Users can store their data remotely in the cloud and use clients to get to it whenever they need to. This technology offers services using one of three service models: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). This model makes it possible for users and organizations all over the world to share their important information and important computing resources. One of the main things that slows down the growth of this technology in the information technology (IT) industry is making sure that users can't get to these important resources without permission. Authentication is one of the most important ways to make sure that only the right people can use registered services. The goal of this paper is to find out what's wrong with different authentication methods and figure out how to fix them.

Key Words

Cloud Computing, Authenticaion Mechanism, Cipher, Cryptography.

Cite This Article

"A Survey on Different Authentication techniques used for Improving Security ", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.9, Issue 8, page no.d75-d81, August-2022, Available :http://www.jetir.org/papers/JETIR2208310.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"A Survey on Different Authentication techniques used for Improving Security ", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.9, Issue 8, page no. ppd75-d81, August-2022, Available at : http://www.jetir.org/papers/JETIR2208310.pdf

Publication Details

Published Paper ID: JETIR2208310
Registration ID: 501361
Published In: Volume 9 | Issue 8 | Year August-2022
DOI (Digital Object Identifier):
Page No: d75-d81
Country: Vaishali, Bihar, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000276

Print This Page

Current Call For Paper

Jetir RMS