Innovation in cloud computing: Implementation of Kerberos version5in cloud computing in order to enhance the security issues

被引:0
作者
Hojabri, Mehdi [1 ]
Rao, K. Venkat [2 ]
机构
[1] Andhra Univ, Dept Comp Sci & Syst Engn, Vizag 530003, India
[2] Andhra Univ, Fac Comp Sci & Syst Engn, Waltair 530003, Andhra Pradesh, India
来源
2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES) | 2013年
关键词
kerberos authentication service; Third party auditor; cloud service provider; cloud computing; cloud security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cloud computing paradigm is considered as the next-generation of IT technology. It is also the internet based technology, where the users can share resources among the enormous cloud service provider, such as cloud partners and cloud vendors. Cloud computing makes high quality of service and high availability, so that users can simply access to prefer cloud with internet device. This makes many advantages and drawbacks for the users to create and store data in the cloud service provider. One is the data management and software may not be fully trustworthy in the cloud, therefore the security is an important aspect of quality of service. The purpose of this article is to concentrate on cloud data storage security and to manage the user's data in the cloud by Implementation of kerberos authentication service. I believe this novel article is the background for the next opportunity of growing the cloud security.
引用
收藏
页码:452 / 456
页数:5
相关论文
共 50 条
  • [21] Security and Privacy Issues in Cloud Computing
    UbaidullahBokhari, Mohammad
    MakkiShallal, Qahtan
    Tamandani, Yahya Kord
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 896 - 900
  • [22] Cloud Computing: Cloud Security to Trusted Cloud
    Wu Jiyi
    Shen Qianli
    Zhang Jianlin
    Xie Qi
    NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600
  • [23] A Survey of Cloud Computing and Cloud Security
    Sui, Xin
    Sui, Yi
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION AND INFORMATION (MEICI 2018), 2018, 163 : 284 - 287
  • [24] Cloud computing and cloud security in China
    Zhang, Shaohe
    Jiang, Cuenyun
    Wang, Ruxin
    ADVANCES IN MATERIALS, MACHINERY, ELECTRONICS II, 2018, 1955
  • [25] A Review on Different Security Issues and Challenges in Cloud Computing
    Narang, Ashima
    Gupta, Deepali
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, POWER AND COMMUNICATION TECHNOLOGIES (GUCON), 2018, : 121 - 125
  • [26] Cloud Computing Security Issues and its Solution: A Review
    Kaur, Randeep
    Kaur, Jagroop
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1198 - 1200
  • [27] Cloud Computing Security Issues: a Stakeholder’s Perspective
    Verma G.
    Adhikari S.
    SN Computer Science, 2020, 1 (6)
  • [28] Trust Model to Enhance Security of Cloud Computing
    Mohsenzadeh, Ali
    JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE-JMCS, 2015, 14 (04): : 315 - 325
  • [29] Issues And Challenges of Data Security In A Cloud Computing Environment
    Sharma, Pradeep Kumar
    Kaushik, Prem Shankar
    Agarwal, Prerna
    Jain, Payal
    Agarwal, Shivangi
    Dixit, Kamlesh
    2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017, : 560 - 566
  • [30] The SLA security issues in cloud computing services
    Barbu, Dragos
    Sipica, Alexandru
    Candet, Ionut
    ROMANIAN JOURNAL OF INFORMATION TECHNOLOGY AND AUTOMATIC CONTROL-REVISTA ROMANA DE INFORMATICA SI AUTOMATICA, 2019, 29 (03): : 31 - 40