Text this: Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review