Provided by: International Research Journal of Engineering and Technology (IRJET)
Date Added: Sep 2015
Cloud computing offers the vision of a virtually infinite pool of computing, storage and networking resources where application can be scalable and deployed. The security threats on cloud increases rapidly. The threat starts from login module to the core storage. In this paper, different levels of threat is handled efficiently, which enables the secured data communications between the server and client. The login is authenticated using Open Authentication protocol (OAuth) 2.0 with enhanced security mechanism.