The comprehensive and detailed frameworks constructed to assure successful authentication in cloud computing are discussed and differences between considered techniques used in different frameworks are discussed.
One solution that helps with straightforward, anytime, anywhere accessibility to reconfigurable computational capabilities is cloud computing. Users of this computing platform are genuinely concerned about security and need to find dependable providers of cloud services. Authentication is believed to be a main necessity for assuring secure cloud access. In this paper, we discussed the comprehensive and detailed frameworks constructed to assure successful authentication in cloud computing. Also, this survey paper discusses differences between considered techniques used in different frameworks.