CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

A Secure Key for Cloud using Threshold Cryptography in Kerberos

by Shubha Bharill, T. Hamsapriya, Praveen Lalwani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Number 7
Year of Publication: 2013
Authors: Shubha Bharill, T. Hamsapriya, Praveen Lalwani
10.5120/13757-1594

Shubha Bharill, T. Hamsapriya, Praveen Lalwani . A Secure Key for Cloud using Threshold Cryptography in Kerberos. International Journal of Computer Applications. 79, 7 ( October 2013), 35-41. DOI=10.5120/13757-1594

@article{ 10.5120/13757-1594,
author = { Shubha Bharill, T. Hamsapriya, Praveen Lalwani },
title = { A Secure Key for Cloud using Threshold Cryptography in Kerberos },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 79 },
number = { 7 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 35-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume79/number7/13757-1594/ },
doi = { 10.5120/13757-1594 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:52:26.474822+05:30
%A Shubha Bharill
%A T. Hamsapriya
%A Praveen Lalwani
%T A Secure Key for Cloud using Threshold Cryptography in Kerberos
%J International Journal of Computer Applications
%@ 0975-8887
%V 79
%N 7
%P 35-41
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In IT industry now a days there is a need for several new resources and storage requirement for terabyte of data generated every day. Cloud Computing is a solution for this in a cost effective manner. Cloud Computing provides on demand resources as services to client. Cloud is highly scalable, flexible and platform in dependable. Although it is benefiting the clients in several ways but as data is stored remotely it has many security loopholes like attacks, data loss, other authentication and security issues. In this paper an authentication model is proposed for cloud computing based on Kerberos protocol using threshold cryptography to provide more security and to increase the availability of key. This model can also benefit by filtering the unauthorized access and to reduce the burden of computation and memory usage of cloud provider against authentication checks for each client. It acts as a third party between cloud server and clients to allow authorized and secure access to cloud services. In this paper we will take a review of related work for cloud security issues and attacks. In next section we will discuss the proposed architecture and its working. Next we will see how it can provide better security and availability to key used for authentication.

References
  1. Mehdi Hojabri, K. venkat rao "Innovation in Cloud Computing: Implementation of Kerberos version5 in cloud computing in order to enhance the security issues" IEEE, International Conference on Information Communication and Embedded System( ICICES), 2013, pp 34-45.
  2. Jeong-Kyung Moon, Jin-Mook Kim and Hwang-Rae Kim, "A Secure Authentication Protocol for Cloud Services", Journal Of Advanced Information Technology And Convergence, 2012, pp 33-36.
  3. Jeffrey Lok Tin Woo, and Mahesh V. , "Tripunitara Composing Kerberos and Multimedia Internet Keying (MIKEY) for Authenticated Transport of Group Keys" , IEEE, Transactions on Parallel and Distributed Systems, 2013, pp 1-11.
  4. ] X. Zhang, H. Du, J. Chen, Y. Lin, L. Zeng "Ensure Data Security in Cloud Storage" International Conference on Network Computing and Information Security,2011, pp. 284-287.
  5. Rosa Sánchez, Florina Almenares, Patricia Arias, Daniel Díaz-Sánchez, Andrés Marí n "Enhancing Privacy and Dynamic Federation in IdM for Consumer Cloud Computing", IEEE, Transaction on Consumer Electronics, 2012, pp 95-103.
  6. M. R. Tribhuwan, V. A. Bhuiyar, S. Pirzade "Ensuring Data Storage Security in Cloud Computing through Handshake based on Token Management" IEEE, International Conference on Advances in Recent Technologies in Communication and Computing,2010, pp. 386-389.
  7. Ming-Huang Guo, Horng-Twu Liaw, Li-Lin Hsiao, Chih-Yuan Huang, Chih-Ta Yen , "Authentication Using Graphical Password in Cloud", IEEE, 15th International Symposium on Wireless Personal Multimedia Communications, 2012, pp 177-181.
  8. Sanjeev Pippal, Vishu Sharma, Shakti Mishra, D. S. Kushwaha , "An Efficient Schema Shared Approach for Cloud based Multitenant Database with Authentication & Authorization Framework", 2011, IEEE, International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp 213-218.
  9. W. Itani, A. Kayssi. A. Chehab "Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures" Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing,2009, pp. 711-715
  10. Sushmita Ruj?, Milos Stojmenovic†, Amiya Nayak, "Privacy Preserving Access Control with Authentication for Securing Data in Clouds", 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, 2012, pp 556-563.
  11. Lifei Wei, Haojin Zhu, Zhenfu Cao, Weiwei Jia and Athanasios V. Vasilakos, "SecCloud: Bridging Secure Storage and Computation in Cloud", IEEE 30th International Conference on Distributed Computing Systems. 2010, pp 52-61.
  12. Hassan Takabi, James B. D. Joshi, Gail-Joon Ahn, "Secure Cloud: Towards a Comprehensive Security Framework for Cloud Computing Environments", 34th Annual IEEE Computer Software and Applications Conference Workshops,2010, pp 393-398.
  13. Jinyue Xia and Yongge Wang, "Secure Key Distribution for the Smart Grid", IEEE, Transactions On Smart Grid, 2012, pp 1437-1443.
  14. C. C. Tan, Q. Liu, and J. Wu, "Secure Locking For Untrusted Clouds" , 4th IEEE International Conference on Cloud Computing, 2011, pp. 131-138.
  15. Farhan Bashir Shaikh and Sajjad Haider, "Security Threats in Cloud Computing", Sixth IEEE International Conference on Internet Tehnology and Secure Transaction , pp 120-126.
  16. Ashish G. Revar, Madhuri D. Bhavsar, "Securing User Authentication using Single Sign-On in Cloud Computing", IEEE, International Conference On Current Trends In Technology, 2011, pp 1-4.
  17. Zubair Ahmad and Jamalul- Lail AbManan, "Trusted Computing based Open Environment User Authentication Model", 3rd IEEE, International Conference on Advanced Computer Theory and Engineering ,IEEE,2010,pp 487-491.
  18. www. wikipedia. com
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Kerberos Threshold Cryptography Security Authentication.