Security Analysis of User Identity Authentication in the Background of Cloud Computing

Shen Yan

Computer & Telecommunication ›› 2016, Vol. 1 ›› Issue (8) : 55-57.

Computer & Telecommunication ›› 2016, Vol. 1 ›› Issue (8) : 55-57.

Security Analysis of User Identity Authentication in the Background of Cloud Computing

  • Shen Yan
Author information +
History +

Abstract

As an important product of the combination of computer technology and the Internet, cloud computing has opened a new round of technological revolution in the field of IT and information. However, cloud computing has a lot of risk problems. There are still many vulnerability problems under the current regulatory network environment, producing a huge threat for the information security of the network users. In order to solve this problem, it is imminent to carry out the user authentication security analysis in the background of cloud computing. This paper will focus on the cloud computing security problems and puts forward some specific measures.

Key words

cloud computing / user identity authentication / security analysis

Cite this article

Download Citations
Shen Yan. Security Analysis of User Identity Authentication in the Background of Cloud Computing[J]. Computer & Telecommunication. 2016, 1(8): 55-57

Accesses

Citation

Detail

Sections
Recommended

/