Abstract
Cloud Computing is one of the most famous field in the world of computer science research. The layered architecture forms a pyramid with categorization SaaS, PaaS&IaaS laid top to bottom. The user of this service model goes pay-per-use basis to the service provider. Like the other popular field, cloud computing too attracts those who likes to find loopholes to benefit themselves illegally. In this paper, we are using Kerberos at the server end, to avoid third-party dependency. To achieve confidentiality, cryptography is also taken in use along with the elliptic curve.