Innovation in cloud computing: Implementation of Kerberos version5in cloud computing in order to enhance the security issues

被引:0
作者
Hojabri, Mehdi [1 ]
Rao, K. Venkat [2 ]
机构
[1] Andhra Univ, Dept Comp Sci & Syst Engn, Vizag 530003, India
[2] Andhra Univ, Fac Comp Sci & Syst Engn, Waltair 530003, Andhra Pradesh, India
来源
2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES) | 2013年
关键词
kerberos authentication service; Third party auditor; cloud service provider; cloud computing; cloud security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cloud computing paradigm is considered as the next-generation of IT technology. It is also the internet based technology, where the users can share resources among the enormous cloud service provider, such as cloud partners and cloud vendors. Cloud computing makes high quality of service and high availability, so that users can simply access to prefer cloud with internet device. This makes many advantages and drawbacks for the users to create and store data in the cloud service provider. One is the data management and software may not be fully trustworthy in the cloud, therefore the security is an important aspect of quality of service. The purpose of this article is to concentrate on cloud data storage security and to manage the user's data in the cloud by Implementation of kerberos authentication service. I believe this novel article is the background for the next opportunity of growing the cloud security.
引用
收藏
页码:452 / 456
页数:5
相关论文
共 50 条
[41]   An Exhaustive Review on Security Issues in Cloud Computing [J].
Fatima, Shahin ;
Ahmad, Shish .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (06) :3219-3237
[42]   REVIEW ON SPACE AND SECURITY ISSUES IN CLOUD COMPUTING [J].
Rao, N. Thirupathi ;
Bhattacharyya, Debnath .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2019, 13 (02) :1-8
[43]   Security Issues and Challenges of Mobile Cloud Computing [J].
Shahzad, Abid ;
Hussain, Mureed .
INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2013, 6 (06) :37-49
[44]   Critical Security Issues in Cloud Computing: A Survey [J].
Sun, Xiaotong .
2018 IEEE 4TH INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), 4THIEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 3RD IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2018, :216-221
[45]   A Cloud Computing Security Framework Based on Cloud Security Trusted Authority [J].
Dawoud, Mohammed M. ;
Ebrahim, Gamal A. ;
Youssef, Sameh A. .
INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016), 2016, :133-138
[46]   Cloud Computing Implementation: Key Issues and Solutions [J].
Rastogi, Garima ;
Sushil, Rama .
2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, :320-324
[47]   A Novel Data Logging Framework to Enhance Security of Cloud Computing [J].
Jain, Jainish Rajesh ;
Asaduzzaman, Abu .
SOUTHEASTCON 2016, 2016,
[48]   Cloud Computing Security: A Survey [J].
Khalil, Issa M. ;
Khreishah, Abdallah ;
Azeem, Muhammad .
COMPUTERS, 2014, 3 (01) :1-35
[49]   Analysis on the Security of Cloud Computing [J].
He Zhonglin ;
He Yuhua .
PIAGENG 2010: PHOTONICS AND IMAGING FOR AGRICULTURAL ENGINEERING, 2010, 7752
[50]   Security Concerns in Cloud Computing [J].
Kaur, Puneet Jai ;
Kaushal, Sakshi .
HIGH PERFORMANCE ARCHITECTURE AND GRID COMPUTING, 2011, 169 :103-112