Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review.
Syed Amma SheikAmutha Prabakar MuniyandiPublished in: Cyber Secur. Appl. (2023)
Keyphrases
- cloud computing
- identity management
- secure manner
- artificial neural networks
- security issues
- security mechanisms
- key agreement
- computing resources
- distributed computing
- data center
- cloud computing environment
- data management
- big data
- service providers
- network access
- authentication protocol
- computing technologies
- cloud storage
- remote attestation
- data privacy
- user authentication
- security analysis
- private cloud
- business models
- security requirements
- trust relationships
- cloud computing platform
- computing platform
- intrusion detection
- trusted computing
- information sharing
- access control
- low cost
- web services
- database