Cloud Computing is an on-demand network. Cloud computing is an excellent favourable and quickly developing technology. In this type of network, you can access your data at anytime, anywhere if you are an authentic user of Cloud Computing. To store data on cloud computing environment is safe. There is no restriction of time and place to access your data from Cloud Computing environment if you have a proper internet connection. Authentication is a very important term in Cloud Computing for data security. Cloud Computing is a distributed computing and it is useful for storing and analysing large amounts of data in one place. As per your requirements you can use any type of cloud computing. This paper is focusing on different authentication levels used in cloud computing and survey of users view on these authentication levels.
Software And Hardware