Figure 1:
Classification of Authentication Attacks in the Cloud Environment