Additional Authentication and Authorization using Registered Email-ID for Cloud Computing
Abdelmajid Hassan Mansour Emam

Dr. Abdelmajid Hassan Mansour Emam, Assistant Professor, Department of Information Technology, King Abdulaziz University, Faculty of Computer Science and Information Technology, khulais, Saudi Arabia.
Manuscript received on April 04, 2013. | Revised Manuscript received on April 28, 2013. | Manuscript published on May 05, 2013. | PP: 110-113 | Volume-3, Issue-2, May 2013. | Retrieval Number: B1433053213/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: Cloud computing is a new computing paradigm that changes the way of information technology is provided and used. But achieving acceptable level of information security issues are an important aspect and a key factor in the cloud. This paper firstly lists some of the different security issues of the cloud computing, and then proposes additional security mechanism of authenticating and authorizing users by using registered Email-ID in the cloud computing. To ensure that only authorized persons may use the resources in the role of identity and authorizations management.
Keywords: Cloud Computing, Authentication, Authorization, Identity management.