Cloud computing became a part of everyday life. We allow us to support the device with accessibility across platforms regardless of the location. It has become vulnerable to several security threats because of public environment and internet participation. At this point the attack by hackers can break down the security and leak the information. Data is recognized in the cloud computing as an important corporate asset which must be safeguarded from unwanted internal or external threats. Data encryption provides data protection on sensitive data but also raises computation and memory overhead during large data processing on cloud.Cloud computing also requires low overhead operation to keep the computation as soon as possible. To authenticate the client we apply modified Kerberos protocol.
CITATION STYLE
Gupta*, A., & Mishra, D. K. (2020). Design and Implementation of Strong Authentication Model to Improve Performance of Cloud Computing in Hybrid Cloud Environment. International Journal of Innovative Technology and Exploring Engineering, 9(5), 1323–1328. https://doi.org/10.35940/ijitee.e2894.039520
Mendeley helps you to discover research relevant for your work.