Authentication and Authorization Mechanism for Cloud Security
J. Vijaya Chandra1, Narasimham Challa2, Sai Kiran Pasupuletti3

1J.Vijaya Chandra, Research Scholar, Dept of CSE, KLEF (Deemed to be University), Guntur, Andhra Pradesh, India.
2Dr. Narasimham Challa, Dean IQAC and Professor, Dept of CSE, Vignan’s Institute of Technology and Science, Vishakapatnam, A.P., India.
3Dr. Sai Kiran Pasupuleti, Professor, Dept of CSE, KLEF(Deemed to be University), Guntur, Andhra Pradesh, India.
Manuscript received on July 20, 2019. | Revised Manuscript received on August 10, 2019. | Manuscript published on August 30, 2019. | PP: 2072-2078 | Volume-8 Issue-6, August 2019. | Retrieval Number: F8473088619/2019©BEIESP | DOI: 10.35940/ijeat.F8473.088619
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud Computing is a most widespread and popular form of computing, promising high reliability for customers and providers both at the same point of time for many fields, where cloud storage security is based on Authentication and Authorization in cloud computing. Data is uploaded into a cloud and stored in a datacenter, Authentication and authorization are the major concerns to access the data stored in cloud by users from the data center. Security is a major issue; these are mainly deal with identity and access management, prevention of data loss and malware attack control management. In this paper we majorly concentrated on Authentication and Authorization to cloud access, we focused on identity management mechanism as cloud security solution that provides directory services for application access management. We discussed the protocols that support authorization and allows the communication across applications with the help of tokens instead of credentials. We even concentrated on the different mechanisms which plays a major role in designing a secured cloud computing architecture from malicious intrusions and attacks, it is a step to verify the presence and functioning of the cloud customers and cloud providers through security mechanisms to protect from different risks, threats and attacks. In this paper we discussed different security Algorithms and Authentication architecture along with the proposed algorithm, where analysis is done along with the computational evaluation with output.
Keywords: Authorization, Authentication, Auditing, Confidentiality, Integrity, Accounting, Cloud Security.