The cloud computing architecture is composed of various types of configurable distributed systems with a broad range of connectivity, accessibility and usage. Authorization and authentication are two important security mechanisms in the cloud computing, especially in securing authorized accesses to services and resources. With proper security management, authentication and authorization also provide managing and preventing the various unauthorized accesses in the cloud system. Securing services in the cloud, controlling access to resources through the proper authentication and authorization mechanisms, protecting and providing their security are considered critical tasks for the cloud service provider. In this paper are surveyed issues that are related to authentication and authorization management of services in the cloud environment. Here are studied and compared details about cloud computing services and providers, with particular emphasis the service oriented cloud computing architecture in terms of authentication and authorization. The existing mechanisms of authentication and authorization in the cloud computing are discussed comprehensively and their necessary requirements, evaluating them against the respective requirements.
Cloud Computing · Service Oriented Cloud Architecture · Authorization · Authentication · Security.