(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 12, No. 11, 2021 178 | Page www.ijacsa.thesai.org Secured and Provisioned Access Authentication using Subscribed User Identity in Federated Clouds Sudan Jha 1 , Sultan Ahmad 2 *, Meshal Alharbi 3 , Bader Alouffi 4 and Shoney Sebastian 5 School of Sciences, Christ (Deemed to be University), NCR, New Delhi, India 1 Department of Computer Science, College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University, Alkharj, 11942, Saudi Arabia 2, 3 Department of Computer Science, College of Computers and Information Technology Taif University, P.O. Box 11099, Taif, 21944, Saudi Arabia 4 Department of Computer Science, Christ (Deemed to be University), Bangalore-29, India 5 AbstractCloud computing has become an essential source for modern trade or market environments by abled frameworks. The exponential growth of cloud computing services in the last few years has resulted in extensive use, especially in storing and sharing the data on various cloud servers. The current trend in the cloud shows that the cloud owners use relative functions and target areas in such a way that cloud customers access or store their data either in the same servers or related servers. Simultaneously, from the security point of view, the lack of confidence about the customer's data on the cloud server is still questionable. The hour's need is to provide the cloud service in a 'single port way' by forming the joint management policy to increase customer satisfaction and profitability. In addition to this, the authentication steps also need to be improvised. This paper discusses issues on the security authentication and access provisioning of the cloud service consumers in federated clouds using subscribed user identity. This work proposes the user identity verification module (UidVM) in the cloud service consumer's authentication process to serve as a cloud broker to minimize the work overloads on the central cloud federation management system, thus enhancing the cloud security. KeywordsSecurity authentication (SA); cloud federation (CF); cloud service provider (CSP); key distribution center (KDC); user identity verification module (UIdVM) I. INTRODUCTION Cloud computing is a rapidly growing technology to share/store data on the cloud server in a cost-effective manner (Timely and financial effectiveness). Cloud computing is a distributed-based service to the remote data consumer. Nowadays, cloud computing is used as a significant source and framework for modern trade or market environments. Consumers adapted to the online cloud service buy and sell products, and many of them spend their time accessing and share cloud resources daily. This has also led cloud computing technology to business society. Therefore, any number of people who are business owners prefer cloud services. Cloud computing technology helps enterprises and organizations make computing their resources addressable to the partner and consumer to achieve a more scalable, flexible, competent, and cost-effective circle for application development [1]. Presently, cloud-computing domains (public, private and hybrid clouds) furnish different services to minimize the repairing costs on various cloud services. As described in [2], the initially formed cloud computing model has reached a high level of evolution, exposure to various extents to settle the primary characteristic of the prototype resource argument, interpose of services, lack of interoperability in data representation, quality of service degradation, and others. A. Cloud Computing Service Providers (CCSP) Cloud computing is the panoramic concept in the recent computing technology explained in several ways by many researchers. However, cloud computing is an unspecific term for the transaction of the distributed services in the networked hosts. It provides easy accessibility for the companies to use computing resources (e.g., an application, virtual machine) as a utility rather than developing by their own. In short, cloud computing is accessing/storing programs and data/resources over connected networks as an alternative using an individual hard drive/storage device. The purpose of 'Cloud Computing Service Providers' (CCSP) is to solve cloud computing problems. These joint CCSPs are formally called cloud federations and are responsible for handling the most critical situations [3]. Cloud federation has been one of the murmuring terms since long when the issue of transacting from users' resources to the remote cloud server was raised. The issue was the transaction through an easy and pervasive way of accessing [4]. Different models have been discussed in this regard; however, cloud computing was built with the dual combinations of the cloud computing deployment model and cloud computing service model. B. Cloud Computing Service Models Cloud computing service model is a combination of three services/models. Software as a Service (SaaS to help in using the cloud applications on consumer devices running on the cloud infrastructure as provided by the respective cloud providers. [5]. Platform as a service (PaaS: which provides platforms to allow the service consumers to develop, run, and control over all the cloud applications by removing the complicated building and maintaining of the cloud infrastructure [6] and thirdly, Infrastructure as a service (IaaS which is the fundamental resources access provider on the cloud infrastructure. Physical and virtual machines, load balance, virtual storage, etc., are the essential resources availed *Corresponding Author.