Authentication scheme in cloud computing: A review | IEEE Conference Publication | IEEE Xplore