Abstract

Cloud computing became a part of everyday life. We allow us to support the device with accessibility across platforms regardless of the location. It has become vulnerable to several security threats because of public environment and internet participation. At this point the attack by hackers can break down the security and leak the information. Data is recognized in the cloud computing as an important corporate asset which must be safeguarded from unwanted internal or external threats. Data encryption provides data protection on sensitive data but also raises computation and memory overhead during large data processing on cloud.Cloud computing also requires low overhead operation to keep the computation as soon as possible. To authenticate the client we apply modified Kerberos protocol.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call