Study on Data Security in Cloud Architecture Based on Kerberos authentication System

Authors

  • Shital A. Salve  JSPM’S Imperial College of Engineering and Research, Wagholi, Pune, Maharashtra, India

Keywords:

cloud architecture, Kerberose, Security

Abstract

Now Technological expansions in cloud computing due to increased connectivity and exponentially blooming data has resulted in journey towards cloud architecture. Cloud computing is technology where the users’ can use high services in form of software that reside on different servers and access data from all over the world. Cloud storage is allows users to access and store their data anywhere. It also guarantees best usage of the available resources. With a capable technology like this, it certainly abdicates users’ privacy, putting new security threats towards the certitude of data in cloud. The security threats such as preservation of data integrity, data hiding and data safety concerns when the issue of cloud security bring up. In this research paper, we have studied design for cloud computing architecture which ensures secured movement of data at client and server end. We have used the Authentication Kerberos protocol mechanism for Authentication of Client.

References

  1. Joshi, J.B.D., Gail-Joon Ahn. Security and Privacy Challenges in Cloud Computing Environments. IEEE Security Privacy Magazine, Vol 8, IEEE Computer Society, 2010, p.24-31.
  2. Farzad Sabahi. Cloud Computing Security Threats and Responses. Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference.
  3. Ashutosh Kumar Dubey, Animesh Kumar Dubey, Mayank
  4. Namdev, Shiv Shakti Shrivastava. Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment. Software Engineering (CONSEG), CSI Sixth International Conference, Sept. 2012
  5. M.Venkatesh,M.R.Sumalatha, Mr.C.SelvaKumar. Improving Public Auditability, Data Possession in Data Storage Security for Cloud Computing. Recent Trends In Information Technology (ICRTIT), 2012 International Conference, April 2012.
  6. Prashant Rewagad, Yogita Pawar in. Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing. 2013 International Conference on Communication Systems and Network Technologies.
  7. Ashish Agarwal, Aparna Agarwal. The Security Risks Associated with Cloud Computing. International Journal of Computer Applications in Engineering Sciences [VOL I, SPECIAL ISSUE ON CNS, JULY 2011] [ISSN: 2231-4946].
  8. Hai Yan, Zhijie Jerry Shi. Software Implementations of Elliptic Curve Cryptography. Information Technology: New Generations, Third International Conference, April 2006.
  9. Ravi Gharshi, Suresha. Enhancing Security in Cloud Storage using ECC Algorithm. International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 Volume 2 Issue 7, July 2013.
  10. H. Modares, M. T. Shahgoli, H. Keshavarz, A. Moravejosharieh, R. Salleh. Make a Secure Connection Using Elliptic Curve Digital Signature. International Journal of Scientific & Engineering Research Volume 3, Issue 9, September-2012 ISSN 2229-5518 IJSER © 2012.
  11. Aqeel Khalique Kuldip Singh Sandeep Sood. Implementation of Elliptic Curve Digital Signature Algorithm. International Journal of Computer Applications (0975 – 8887) Volume 2 – No.2, May 2010.
  12. Neha Tritani,Ganesh R.  Data Security in Cloud Architecture Based on Diffie Hellman  and Elliptical Curve Cryptography,2013
  13. B. Bryant, “Designing an Authentication System: A dialogue in Four Scenes”. Project Athena document(February 1988). Available athttp://web.mit.edu/Kerberos/dialogue.html
  14. C. Neuman, T. Yu, S. Hartman, and K. Raeburn, “TheKerberos network authentication service (V5)”. Network Working Group. Request for Comments: 4120. Available at http: //www.ietf.org/rfc/rfc4120.txt, 2005.
  15. S. Bellovin & M. Merrit, “Limitations of the Kerberos Authentication System,” SIGCOMM Comput. Commun. Rev., 20(5):119–132, 1990.
  16. G. Bella and E. Riccobene, “Formal analysis of the Kerberos authentication system”. Journal of Universal Computer Science, 3(12):1337–1381, 1997.
  17. G. Bella and L. Paulson, “Kerberos version IV: Inductive analysis of the secrecy goals”. InESORICS ’98. Springer, 1998.
  18. J. Kohl, “The use of encryption in Kerberos for network authentication”. In CRYPTO ’89. Springer, 1989.
  19. S. Stubblebine and V. Gligor. “On message integrity incryptographic protocols”. In Symposium on Security and Privacy ’92. IEEE, 1992.
  20. T. D. Wu. “A real-world analysis of Kerberos password security”. In NDSS ’99. The Internet Society, 1999.

Downloads

Published

2015-06-15

Issue

Section

Research Articles

How to Cite

[1]
Shital A. Salve, " Study on Data Security in Cloud Architecture Based on Kerberos authentication System, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 3, pp.130-134, May-June-2015.