CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Securing Storage Appliances via UNIX based Kerberos Authentication

by Latesh Kumar K. J
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 65 - Number 1
Year of Publication: 2013
Authors: Latesh Kumar K. J
10.5120/10888-5784

Latesh Kumar K. J . Securing Storage Appliances via UNIX based Kerberos Authentication. International Journal of Computer Applications. 65, 1 ( March 2013), 17-21. DOI=10.5120/10888-5784

@article{ 10.5120/10888-5784,
author = { Latesh Kumar K. J },
title = { Securing Storage Appliances via UNIX based Kerberos Authentication },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 65 },
number = { 1 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 17-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume65/number1/10888-5784/ },
doi = { 10.5120/10888-5784 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:17:32.071651+05:30
%A Latesh Kumar K. J
%T Securing Storage Appliances via UNIX based Kerberos Authentication
%J International Journal of Computer Applications
%@ 0975-8887
%V 65
%N 1
%P 17-21
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Securing storage systems to use UNIX-based Kerberos version 5 servers for NFS storage authentication using both NFS version 3 and 4. NFS version 4 is the NFS Implementation and mandates Kerberos authentication as part of the NFS client and server specification Integrate their storage systems with Kerberos version 5 to achieve strong NFS storage authentication.

References
  1. B. Clifford Neuman and Theodore Ts'o, Kerberos: An Authentication Service for Computer Networks, IEEE Communications 32 (1994), no. 9, 33—38
  2. S. M. Bellovin and M. Merritt. Limitations of the kerberos authentication system. Computer Communication Review, 20(5):119-132, October 1990. postscript
  3. Prof R. P. Arora, Garima Verma, "Implementation of Authentication and Transaction Security based on Kerberos", IJITCE, Feb 2011 7. .
  4. "How Kerberos Authentication Works",Learn Networking on line magazine, Jan'2008
  5. Ravi Ganesan, "Yaksha' : Augmenting Kerberos with Public Key cryptography"
Index Terms

Computer Science
Information Sciences

Keywords

KDC SEAM MIT NFS CIFS