International Journal of Advance Computational Engineering and Networking (IJACEN)
Follow Us On :
current issues
Volume-11,Issue-8  ( Aug, 2023 )
Past issues
  1. Volume-11,Issue-7  ( Jul, 2023 )
  2. Volume-11,Issue-6  ( Jun, 2023 )
  3. Volume-11,Issue-5  ( May, 2023 )
  4. Volume-11,Issue-4  ( Apr, 2023 )
  5. Volume-11,Issue-3  ( Mar, 2023 )
  6. Volume-11,Issue-2  ( Feb, 2023 )
  7. Volume-11,Issue-1  ( Jan, 2023 )
  8. Volume-10,Issue-12  ( Dec, 2022 )
  9. Volume-10,Issue-11  ( Nov, 2022 )
  10. Volume-10,Issue-10  ( Oct, 2022 )

Statistics report
Nov. 2023
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 128
Paper Published : 1530
No. of Authors : 3973
  Journal Paper

Paper Title :
Kerberos Authentication With Cloud Computing Access Control

Author :Santosh Khamitkar, Yaser Fuad Al-Dubai, Parag Bhalchandra, Pawan Wasnik

Article Citation :Santosh Khamitkar ,Yaser Fuad Al-Dubai ,Parag Bhalchandra ,Pawan Wasnik , (2015 ) " Kerberos Authentication With Cloud Computing Access Control " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 36-41, Volume-3, Issue-6

Abstract : Cloud computing is a relatively new concept, so it is unsurprising that the security of information and data Protection concerns, network security and privacy still need to be addressed fully. The cloud computing allows clients to avoid hardware and software in Investments, gain flexibility, and cooperation with others, and to take advantage of sophisticated Services. However, security is a big problem for cloud computing clients especially access control; client profiles management and access services provided by public cloud computing environment. This article we are proposing an authentication model for cloud computing based on the Kerberos V5 protocol to provide single sign-on and to prevent against DDOS attacks in the access control system. This model could benefit by filtering against unauthorized access and to reduce the burden, computation and memory usage of cloud computing against authentication checks for each client. It acts as a trust third party between cloud computing servers and clients to allow secure access to cloud computing services. In this paper we will see some of the related work for cloud computing access control security issues and attacks. Then in next section we will discuss the proposed architecture. Keywords- Cloud, Role Based Access Control, Authentication Protocol, Key Distribution

Type : Research paper

Published : Volume-3, Issue-6


Copyright: © Institute of Research and Journals

| PDF |
Viewed - 76
| Published on 2015-06-17
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World