Innovation in cloud computing: Implementation of Kerberos version5in cloud computing in order to enhance the security issues

被引:0
作者
Hojabri, Mehdi [1 ]
Rao, K. Venkat [2 ]
机构
[1] Andhra Univ, Dept Comp Sci & Syst Engn, Vizag 530003, India
[2] Andhra Univ, Fac Comp Sci & Syst Engn, Waltair 530003, Andhra Pradesh, India
来源
2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES) | 2013年
关键词
kerberos authentication service; Third party auditor; cloud service provider; cloud computing; cloud security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cloud computing paradigm is considered as the next-generation of IT technology. It is also the internet based technology, where the users can share resources among the enormous cloud service provider, such as cloud partners and cloud vendors. Cloud computing makes high quality of service and high availability, so that users can simply access to prefer cloud with internet device. This makes many advantages and drawbacks for the users to create and store data in the cloud service provider. One is the data management and software may not be fully trustworthy in the cloud, therefore the security is an important aspect of quality of service. The purpose of this article is to concentrate on cloud data storage security and to manage the user's data in the cloud by Implementation of kerberos authentication service. I believe this novel article is the background for the next opportunity of growing the cloud security.
引用
收藏
页码:452 / 456
页数:5
相关论文
共 50 条
[21]   The technical security issues in cloud computing [J].
Shi, Jun ;
Li, Hui ;
Zhou, Lidong .
International Journal of Information and Communication Technology, 2013, 5 (3-4) :272-282
[22]   Cloud Computing: Cloud Security to Trusted Cloud [J].
Wu Jiyi ;
Shen Qianli ;
Zhang Jianlin ;
Xie Qi .
NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 :596-600
[23]   Cloud computing and cloud security in China [J].
Zhang, Shaohe ;
Jiang, Cuenyun ;
Wang, Ruxin .
ADVANCES IN MATERIALS, MACHINERY, ELECTRONICS II, 2018, 1955
[24]   A Survey of Cloud Computing and Cloud Security [J].
Sui, Xin ;
Sui, Yi .
PROCEEDINGS OF THE 2018 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION AND INFORMATION (MEICI 2018), 2018, 163 :284-287
[25]   Issues And Challenges of Data Security In A Cloud Computing Environment [J].
Sharma, Pradeep Kumar ;
Kaushik, Prem Shankar ;
Agarwal, Prerna ;
Jain, Payal ;
Agarwal, Shivangi ;
Dixit, Kamlesh .
2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017, :560-566
[26]   A Review on Different Security Issues and Challenges in Cloud Computing [J].
Narang, Ashima ;
Gupta, Deepali .
2018 INTERNATIONAL CONFERENCE ON COMPUTING, POWER AND COMMUNICATION TECHNOLOGIES (GUCON), 2018, :121-125
[27]   Cloud Computing Security Issues and its Solution: A Review [J].
Kaur, Randeep ;
Kaur, Jagroop .
2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, :1198-1200
[28]   Cloud Computing Security Issues: a Stakeholder’s Perspective [J].
Verma G. ;
Adhikari S. .
SN Computer Science, 2020, 1 (6)
[29]   Trust Model to Enhance Security of Cloud Computing [J].
Mohsenzadeh, Ali .
JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE-JMCS, 2015, 14 (04) :315-325
[30]   SECURITY ISSUES IN CLOUD COMPUTING AND ITS PRECAUTIONS [J].
Kushwaha, Khushbu S. .
ADVANCES AND APPLICATIONS IN MATHEMATICAL SCIENCES, 2021, 20 (12) :3129-3134