Innovation in cloud computing: Implementation of Kerberos version5in cloud computing in order to enhance the security issues

被引:0
|
作者
Hojabri, Mehdi [1 ]
Rao, K. Venkat [2 ]
机构
[1] Andhra Univ, Dept Comp Sci & Syst Engn, Vizag 530003, India
[2] Andhra Univ, Fac Comp Sci & Syst Engn, Waltair 530003, Andhra Pradesh, India
来源
2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES) | 2013年
关键词
kerberos authentication service; Third party auditor; cloud service provider; cloud computing; cloud security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cloud computing paradigm is considered as the next-generation of IT technology. It is also the internet based technology, where the users can share resources among the enormous cloud service provider, such as cloud partners and cloud vendors. Cloud computing makes high quality of service and high availability, so that users can simply access to prefer cloud with internet device. This makes many advantages and drawbacks for the users to create and store data in the cloud service provider. One is the data management and software may not be fully trustworthy in the cloud, therefore the security is an important aspect of quality of service. The purpose of this article is to concentrate on cloud data storage security and to manage the user's data in the cloud by Implementation of kerberos authentication service. I believe this novel article is the background for the next opportunity of growing the cloud security.
引用
收藏
页码:452 / 456
页数:5
相关论文
共 50 条
  • [1] Security Issues In Cloud Computing
    Tianfield, Huaglory
    PROCEEDINGS 2012 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2012, : 1082 - 1089
  • [2] Security Issues in Cloud Computing
    Borazjani, Parnian Najafi
    GREEN, PERVASIVE, AND CLOUD COMPUTING (GPC 2017), 2017, 10232 : 800 - 811
  • [3] Cloud Computing Security Issues and Mechanisms
    Yang, Shuguo
    ADVANCED RESEARCH ON AUTOMATION, COMMUNICATION, ARCHITECTONICS AND MATERIALS, PTS 1 AND 2, 2011, 225-226 (1-2): : 706 - 709
  • [4] A survey of security issues for cloud computing
    Khan, Minhaj Ahmad
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 71 : 11 - 29
  • [5] Security and Privacy Issues in Cloud Computing
    Shaikh, Asma A.
    Iyer, Kamatchi
    INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018, 2019, 26 : 1299 - 1306
  • [6] CLOUD COMPUTING SECURITY ISSUES
    Solanki, Shubhankar
    Khan, Wasim
    Arora, Harshit
    Jain, Anupriya
    IIOAB JOURNAL, 2019, 10 (02) : 43 - 48
  • [7] On Cloud Computing Security Issues
    Fauzi, Ainul Azila Che
    Noraziah, A.
    Herawan, Tutut
    Zin, Noriyani Mohd.
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS (ACIIDS 2012), PT II, 2012, 7197 : 560 - 569
  • [8] Security Issues in Cloud Computing
    Sharma, Pardeep
    Sood, Sandeep K.
    Kaur, Sumeet
    HIGH PERFORMANCE ARCHITECTURE AND GRID COMPUTING, 2011, 169 : 36 - +
  • [9] Investigating Security Issues in Cloud Computing
    Moyo, Tumpe
    Bhogal, Jagdev
    2014 EIGHTH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS),, 2014, : 141 - 146
  • [10] An Analysis of Security Related Issues in Cloud Computing
    Babu, L. D. Dhinesh
    Krishna, P. Venkata
    Zayan, A. Mohammed
    Panda, Vijayant
    CONTEMPORARY COMPUTING, 2011, 168 : 180 - +