Design and Implementation of Strong Authentication Model to Improve Performance of Cloud Computing in Hybrid Cloud Environment
Anil Gupta1, Durgesh Kumar Mishra2
1Anil Gupta*, CSE Department, Mewar University, Chittorgarh (RJ), India.
2Durgesh Kumar Mishra, CSE Department, Sri Aurobindo Institute of Technology (SAIT), Indore, MP India.
Manuscript received on February 12, 2020. | Revised Manuscript received on February 22, 2020. | Manuscript published on March 10, 2020. | PP: 1323-1328 | Volume-9 Issue-5, March 2020. | Retrieval Number: E2894039520/2020©BEIESP | DOI: 10.35940/ijitee.E2894.039520
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Cloud computing became a part of everyday life. We allow us to support the device with accessibility across platforms regardless of the location. It has become vulnerable to several security threats because of public environment and internet participation. At this point the attack by hackers can break down the security and leak the information. Data is recognized in the cloud computing as an important corporate asset which must be safeguarded from unwanted internal or external threats. Data encryption provides data protection on sensitive data but also raises computation and memory overhead during large data processing on cloud.Cloud computing also requires low overhead operation to keep the computation as soon as possible. To authenticate the client we apply modified Kerberos protocol.
Keywords: Cloud, Cloud Computing, Data Protection, Kerberos protocol.
Scope of the Article: Cloud Computing