Development Of Authentication Protocols When Accessing Cloud Services

Authors: V. Chaikovska , A. Oksiiuk
Affiliation: Taras Shevchenko National University of Kyiv


Keywords: authentication, cloud services, information security, protocols, secure connection
ABSTRACT. Cloud services are a rapidly developing industry, but rapid development is accompanied by many problems. One of such problems is unsafe authentication, which leads to the theft of confidential information. The problem of theft the access to the account is discussed all over the world. In this article, the authentication protocols that are being used, modified and developed by scientists and developers were reviewed. The presence of a large information base indicates that this problem is urgent and requires solutions.