Cloud Access with Load Balancing and Certificateless Signature Authentication
Manmohan Sharma1, V.K. Jain2

1Manmohan Sharma, Department of CSE, SET, Mody University of Science and Technology, Lakshmangarh, Sikar (Rajasthan), India.
2V.K. Jain, Department of CSE, SET, Mody University of Science and Technology, Lakshmangarh, Sikar (Rajasthan), India.

Manuscript received on 18 April 2019 | Revised Manuscript received on 25 April 2019 | Manuscript published on 30 April 2019 | PP: 649-654 | Volume-8 Issue-4, April 2019 | Retrieval Number: D6656048419/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing is one of the most emerging technology in the market which caters the demand of large people in an economic fashion. Nowadays most of the organizations are using cloud services directly or indirectly and they pay for these services on the basis of their usage. Another important property of cloud computing is on-demand services. Most of the organizations and individuals are using cloud services for storage of their data and retrieval of the data. In both the case there might be the chances of data loss and data hacking. So to ensure the security and integrity of the data we need to apply certain encryption techniques. We focus on security aspects in cloud ensuring load balancing and authentication using Certificateless public key cryptography technique.
Keywords: Cloud Computing, Data Security, An Encryption Technique, Load Balancing.

Scope of the Article: Cloud Computing