Classification
Figure 1: Classification of Authentication Attacks in the Cloud Environment