A Secure Key for Cloud using Threshold Cryptography in Kerberos

In IT industry now a days there is a need for several new resources and storage requirement for terabyte of data generated every day. Cloud Computing is a solution for this in a cost effective manner. Cloud Computing provides on demand resources as services to client. Cloud is highly scalable, flexible and platform in dependable. Although it is benefiting the clients in several ways but as data is stored remotely it has many security loopholes like attacks, data loss, other authentication and security issues. In this paper an authentication model is proposed for cloud computing based on Kerberos protocol using threshold cryptography to provide more security and to increase the availability of key. This model can also benefit by filtering the unauthorized access and to reduce the burden of computation and memory usage of cloud provider against authentication checks for each client. It acts as a third party between cloud server and clients to allow authorized and secure access to cloud services. In this paper we will take a review of related work for cloud security issues and attacks. In next section we will discuss the proposed architecture and its working. Next we will see how it can provide better security and availability to key used for

[1]  Andrés Marín López,et al.  Enhancing privacy and dynamic federation in IdM for consumer cloud computing , 2012, IEEE Transactions on Consumer Electronics.

[2]  Chih-Yuan Huang,et al.  Authentication using graphical password in cloud , 2012, The 15th International Symposium on Wireless Personal Multimedia Communications.

[3]  Jie Wu,et al.  Secure Locking for Untrusted Clouds , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[4]  Suziah Sulaiman,et al.  Trusted Computing based open environment user authentication model , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[5]  Sushmita Ruj,et al.  Privacy Preserving Access Control with Authentication for Securing Data in Clouds , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).

[6]  Sajjad Haider,et al.  Security threats in cloud computing , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[7]  Dharmender Singh Kushwaha,et al.  An Efficient Schema Shared Approach for Cloud Based Multitenant Database with Authentication and Authorization Framework , 2011, 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.

[8]  Yi Lin,et al.  Ensure Data Security in Cloud Storage , 2011, 2011 International Conference on Network Computing and Information Security.

[9]  Ayman I. Kayssi,et al.  Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[10]  Gail-Joon Ahn,et al.  SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.

[11]  K. Venkat Rao,et al.  Innovation in cloud computing: Implementation of Kerberos version5in cloud computing in order to enhance the security issues , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).

[12]  M.R. Tribhuwan,et al.  Ensuring Data Storage Security in Cloud Computing through Two-Way Handshake Based on Token Management , 2010, 2010 International Conference on Advances in Recent Technologies in Communication and Computing.

[13]  Marco Furini,et al.  International Journal of Computer and Applications , 2010 .

[14]  Jin-Mook Kim,et al.  A Secure Authentication Protocol for Cloud Services , 2011 .

[15]  Athanasios V. Vasilakos,et al.  SecCloud: Bridging Secure Storage and Computation in Cloud , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.

[16]  Cong Wang,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[17]  G. Clark,et al.  Reference , 2008 .

[18]  Yongge Wang,et al.  Secure Key Distribution for the Smart Grid , 2012, IEEE Transactions on Smart Grid.

[19]  Ashish G. Revar,et al.  Securing user authentication using single sign-on in Cloud Computing , 2011, 2011 Nirma University International Conference on Engineering.