Abstract
Cloud computing is the result of the newlinepooling of many adaptable computing resources, including servers, networks, storage, and services, to provide users with suitable and on-demand access to the cloud. Identity and access management (IAM) is a critical component of the cloud infrastructure that allows cloud-based service approval. Cloud computing is a readily manageable technology whereby the apps we use are supplied by an unidentified node that does not announce its ownership, so retaining total control of the application. Data storage has become a key problem due to the rise in computer and mobile users in all corresponding industries. These days, a lot of newlinescale firms, both big and little, are expanding quickly in relation to their data. Additionally, they are incurring significant costs for data maintenance. By using this newline technique, With cloud computing, users' need for combinational models of hardware and software are significantly reduced. Chapter 1 of this thesis provides an overview of cloud computing. fresh line This part also covered the benefits and drawbacks of newline cloud computing, as well as the necessity of cloud computing. The required literature for protecting the newline communication between the service provider and service user in a cloud environment from newlinevarious sorts of attacks is then reviewed in Chapter 2. The suggested newlinesystem in this thesis is then explained in detail in Chapter 3, which also offers the method for protecting the cloud environment using group key management newlinetechniques. Subsequently, Chapter 4 addresses a newlineaccess control mechanism for safe cloud communication between the cloud provider and newlinethe user. The work's conclusion and some potential future improvements are finally offered in Chapter 5.