Design and Implementation of Strong Authentication Model to Improve Performance of Cloud Computing in Hybrid Cloud Environment

  • Gupta* A
  • et al.
N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing became a part of everyday life. We allow us to support the device with accessibility across platforms regardless of the location. It has become vulnerable to several security threats because of public environment and internet participation. At this point the attack by hackers can break down the security and leak the information. Data is recognized in the cloud computing as an important corporate asset which must be safeguarded from unwanted internal or external threats. Data encryption provides data protection on sensitive data but also raises computation and memory overhead during large data processing on cloud.Cloud computing also requires low overhead operation to keep the computation as soon as possible. To authenticate the client we apply modified Kerberos protocol.

Cite

CITATION STYLE

APA

Gupta*, A., & Mishra, D. K. (2020). Design and Implementation of Strong Authentication Model to Improve Performance of Cloud Computing in Hybrid Cloud Environment. International Journal of Innovative Technology and Exploring Engineering, 9(5), 1323–1328. https://doi.org/10.35940/ijitee.e2894.039520

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free