Cloud computing is a way of computing which enables the user(individual user) or group(companies or organization) to on-demand access the available universal computing resources on sharing basis which means that it do not have to own the resources(server, storage and application) and can use multiple servers through internet rapidly and conveniently. Cloud is also suffering from many issues which needs to be solved and one of them is user authentication, as cloud is vulnerable to unauthorized usage with the exponential increase in the cloud users. Some user authentication schemes are Two factor authentication(2FA), Elliptic Curve Cryptography(ECC), Ticket authentication, MD5, MD6(message-digest) Graphical passwords and many more. This paper aims at development of a new user authentication scheme for identification of legitimate users to secure the cloud resources.This paper tries to existing schemes and overcome some of the loop holes present in them regarding the user authentication in cloud environment. © Research India Publications.