International Journal of Advance Computational Engineering and Networking (IJACEN)
Follow Us On :
current issues
Volume-11,Issue-5  ( May, 2023 )
Past issues
  1. Volume-11,Issue-4  ( Apr, 2023 )
  2. Volume-11,Issue-3  ( Mar, 2023 )
  3. Volume-11,Issue-2  ( Feb, 2023 )
  4. Volume-11,Issue-1  ( Jan, 2023 )
  5. Volume-10,Issue-12  ( Dec, 2022 )
  6. Volume-10,Issue-11  ( Nov, 2022 )
  7. Volume-10,Issue-10  ( Oct, 2022 )
  8. Volume-10,Issue-9  ( Sep, 2022 )
  9. Volume-10,Issue-8  ( Aug, 2022 )
  10. Volume-10,Issue-7  ( Jul, 2022 )

Statistics report
Sep. 2023
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 125
Paper Published : 1491
No. of Authors : 3833
  Journal Paper

Paper Title :
Authentication Model For Cloud Computing Using Single Sign-On

Author :Aniesh Krishna K, Balagopalan A S

Article Citation :Aniesh Krishna K ,Balagopalan A S , (2014 ) " Authentication Model For Cloud Computing Using Single Sign-On " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 55-60, Volume-2, Issue-12

Abstract : Cloud computing is a way to provide IT resources with the help of internet in a pay-on-use pattern. In spite of the various benefits of using cloud still there exists many vulnerabilities in cloud security which hinders its adoption. The security in cloud is limited to network and application securities. There is a need to establish a system to authenticate the cloud users while he is attempting to access the cloud services within the bounds of the SLA between the cloud provider and the user. The existing system provides authentication based on keys Encryption algorithms either symmetric key-based or asymmetric are key-based. Encryption management is the main problem. This paper proposes a secure authentication and authorization in Cloud Environment with the help of an optimized infrastructure using SL(Single Login).SL is a process gaining access to multiple resources using a single authentication that aims at reducing number of login and password in heterogeneous environment and to have an overall balance in Security, Efficiency and Usability. The authentication model based on the Kerberos protocol to provide single Login and to prevent DDOS attacks is also presented in this paper. Keywords- Security, DDOS, Cloud Computing, Encryption, Sign-on, Kerberos.

Type : Research paper

Published : Volume-2, Issue-12


Copyright: © Institute of Research and Journals

| PDF |
Viewed - 74
| Published on 2014-12-02
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World