ENHANCING PRIVACY IN INTERCLOUD INTERACTION (original) (raw)
Related papers
A Secure Key for Cloud using Threshold Cryptography in Kerberos
In IT industry now a days there is a need for several new resources and storage requirement for terabyte of data generated every day. Cloud Computing is a solution for this in a cost effective manner. Cloud Computing provides on demand resources as services to client. Cloud is highly scalable, flexible and platform in dependable. Although it is benefiting the clients in several ways but as data is stored remotely it has many security loopholes like attacks, data loss, other authentication and security issues. In this paper an authentication model is proposed for cloud computing based on Kerberos protocol using threshold cryptography to provide more security and to increase the availability of key. This model can also benefit by filtering the unauthorized access and to reduce the burden of computation and memory usage of cloud provider against authentication checks for each client. It acts as a third party between cloud server and clients to allow authorized and secure access to cloud services. In this paper we will take a review of related work for cloud security issues and attacks. In next section we will discuss the proposed architecture and its working. Next we will see how it can provide better security and availability to key used for authentication.
International Journal of Engineering Research and Technology (IJERT), 2015
https://www.ijert.org/a-secure-cloud-storage-virtualization-model-and-user-authentication-using-threshold-kerberosv5-scheme https://www.ijert.org/research/a-secure-cloud-storage-virtualization-model-and-user-authentication-using-threshold-kerberosv5-scheme-IJERTV4IS030544.pdf The enormous growth in Information technology industry has led to the growth of server virtualization but to build this virtualization storage server lot of cost is involved. The cost not only involves investing in technology but also maintaining these technologies. This led IT industry to virtualize storage to cloud. Cloud provides resource to user on demand. It is highly scalable, flexible and platform in dependable. Though it provides service on demand the data stored in cloud replica has constrained on security issue like attacks, data loss, other authentication and security issues. Here in this paper we propose a new authentication scheme which improves the existing security loop holes .Here we propose an authentication model by using kerberosV5 web service with threshold cryptography for Amazon S3 cloud. The Kerberos web service which performs authentication acts as a third party between user and Amazon cloud. Our proposed model reduces the overhead of Amazon cloud for doing authentication check thus improving the performance and it is highly secured and efficient.
Study on Data Security in Cloud Architecture Based on Kerberos authentication System
Now Technological expansions in cloud computing due to increased connectivity and exponentially blooming data has resulted in journey towards cloud architecture. Cloud computing is technology where the users’ can use high services in form of software that reside on different servers and access data from all over the world. Cloud storage is allows users to access and store their data anywhere. It also guarantees best usage of the available resources. With a capable technology like this, it certainly abdicates users’ privacy, putting new security threats towards the certitude of data in cloud. The security threats such as preservation of data integrity, data hiding and data safety concerns when the issue of cloud security bring up. In this research paper, we have studied design for cloud computing architecture which ensures secured movement of data at client and server end. We have used the Authentication Kerberos protocol mechanism for Authentication of Client.
IJERT-Ensuring data storage security in cloud computing with effect of kerberos
International Journal of Engineering Research and Technology (IJERT), 2012
https://www.ijert.org/ensuring-data-storage-security-in-cloud-computing-with-effect-of-kerberos https://www.ijert.org/research/ensuring-data-storage-security-in-cloud-computing-with-effect-of-kerberos-IJERTV1IS5003.pdf Cloud computing as we know is envisioned of the next-generation technology of IT industry. In other method is Internet based technology where the users can subscribe high quality of services from data and software that resides in the remote servers. This make many advantage and drawback for the users to create and store data in the cloud servers thereby utilizing fewer resource in client syste and the other hand management of the data and software may not be fully trustworthy and accurate which possesses many security challenges. So the security is important aspect of service quality. In this article,we concentrate on cloud data storage security by the implementation of kerberos authentication service.We define the kerberos for create the ticket and granting ticket for each user.so to make the more focus on user we made more secure.
International Journal of Engineering Research and, 2015
The enormous growth in Information technology industry has led to the growth of server virtualization but to build this virtualization storage server lot of cost is involved. The cost not only involves investing in technology but also maintaining these technologies. This led IT industry to virtualize storage to cloud. Cloud provides resource to user on demand. It is highly scalable, flexible and platform in dependable. Though it provides service on demand the data stored in cloud replica has constrained on security issue like attacks, data loss, other authentication and security issues. Here in this paper we propose a new authentication scheme which improves the existing security loop holes .Here we propose an authentication model by using kerberosV5 web service with threshold cryptography for Amazon S3 cloud. The Kerberos web service which performs authentication acts as a third party between user and Amazon cloud. Our proposed model reduces the overhead of Amazon cloud for doing authentication check thus improving the performance and it is highly secured and efficient.
Increase Security in Cloud Computing Using Hmac and Kerberos Algorithms
International Journal of Research in Engineering and Technology, 2016
The Cloud Computing is a service, based on Internetwork technology. The customers can do data transfer and resource sharing among number of services provided in cloud computing. Any service is easily accessed by a customer from anywhere and anytime in cloud thru Internetworking, therefore it has two good properties called availability and QoS. It has its pros and cons for the customers to create and store the information in cloud server. The application and data management software tools are not that much trustworthiness, then it implies on security aspects of QoS and availability in cloud. Thus we proposed a method for improving security in cloud data storage using Kerberos algorithm and HMAC Public Key Infrastructure.
Kerberos Authentication with Cloud Computing Access Control
2015
Cloud computing is a relatively new concept, so it is unsurprising that the security of information and data Protection concerns, network security and privacy still need to be addressed fully. The cloud computing allows clients to avoid hardware and software in Investments, gain flexibility, and cooperation with others, and to take advantage of sophisticated Services. However, security is a big problem for cloud computing clients especially access control; client profiles management and access services provided by public cloud computing environment. This article we are proposing an authentication model for cloud computing based on the Kerberos V5 protocol to provide single sign-on and to prevent against DDOS attacks in the access control system. This model could benefit by filtering against unauthorized access and to reduce the burden, computation and memory usage of cloud computing against authentication checks for each client. It acts as a trust third party between cloud computing...
Engineering Authentication Process with Cloud Computing
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019
Cloud computing is a way to increase the capacity or add capabilities dynamically without any upfront investments. Despite the growth achieved from the cloud computing, security is still questionable which impacts the cloud model adoption. Aside of having network and application securities being adopted, there must be a security that authenticate the user when accessing the cloud services that is bound to the rules between the cloud computing provider and the client side. The existing system provides authentication based on keys Encryption algorithms either symmetric key-based or asymmetric are key-based. Both encryption approaches have a major problem related to encryption key management i.e. how to securely generate, store, access and exchange secrete keys. In this paper, an optimized infrastructure for secure authentication and authorization in Cloud Environment using SSO (Single Sign-On) is proposed. SSO is a process of authenticating once and gain access of multiple resources that aims at reducing number of login and password in heterogeneous environment and to gain balance in Security, Efficiency and Usability. Also an authentication model for cloud computing based on the Kerberos protocol to provide single sign-on and to prevent against DDOS attacks is also presented in this paper.
An Enhanced Authentication Architecture for Cloud Computing System
International Journal of Engineering Sciences & Research Technology, 2014
Cloud computing is a powerful tool for computation ability. This provides various diverse services and platforms for develop and manage user data in a remote storage. In this context, cloud also provides the ability to share and transfer large amounts of data in an efficient manner. In this paper, we have proposed new security architecture for cloud computing system. This ensures secure authentication system and hiding information from others. In this a diverse light weight AES algorithm based cryptographic solution is proposed for optimizing security. This model also includes one time password system for user authentication process.
Using Kerberos with Digital Signature and AES Encryption to Provide Data Security in Cloud Computing
International Journal of Computer Applications, 2014
The Cloud Computing is the next generation platform that provides dynamic resources pools, virtualization, and high availableness. Today, with the assistance of those computing, we are able to utilize ascendable, distributed computing environments among the boundary of the web, It provides several edges in terms of low value and accessibility of information, conjointly offers associate degree innovative business model for organizations to adopt It's services while not forthright investment. Except for these potential gains achieved from the cloud computing, there are plenty of security problems and challenges related to it and conjointly knowledge privacy protection and knowledge retrieval management is one in all the foremost difficult analysis add cloud computing. To supply security a range of cryptography algorithms and mechanisms are used. Several researchers opt for the simplest they found and use it numerous combinations to supply security to the information in cloud. In this paper, we've got planned to form use of Digital signature and Kerberos with Advanced Encryption Standard cryptography (AES) algorithm program to guard Authentication, Confidentiality, and Integrity of information hold on in cloud.