Distributed Authentication in the Cloud Computing Environment

The cloud computing is considered as the next-generation of IT technology that can provide various elastic and scalable IT services in pay-as-you-go. This technology has been used by worldwide companies to improve their business performance. Therefore, authentication of both clients and services is a significant issue for the trust and security of the cloud computing. At present, to protect the security of the cloud, many ideas have been proposed. In this paper, we present DSA protocol concentrated on authentication of clients. It is an improved protocol based on Kerberos, which prevents password guessing attack by using dynamic session key. We also solved the problem of service availability by introducing two additional messages in the scheme.

[1]  Sufyan T. Faraj Al-Janabi,et al.  Public-Key Cryptography Enabled Kerberos Authentication , 2011, 2011 Developments in E-systems Engineering.

[2]  Gerard Briscoe,et al.  Community Cloud Computing , 2009, CloudCom.

[3]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[4]  Balachander Krishnamurthy,et al.  Privacy awareness about information leakage: who knows what about me? , 2013, WPES.

[5]  Chundong Wang,et al.  Security Analysis and Improvement for Kerberos Based on Dynamic Password and Diffie-Hellman Algorithm , 2013, 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies.

[6]  Ping Yang,et al.  Improvement of Kerberos protocol based on dynamic password and “One-time public key” , 2014, 2014 10th International Conference on Natural Computation (ICNC).

[7]  Dengguo Feng,et al.  Study on Cloud Computing Security: Study on Cloud Computing Security , 2011 .

[8]  K. Popovic,et al.  Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.

[9]  Nitin Gautam,et al.  Replay Attack Prevention in Kerberos Authentication Protocol Using Triple Password , 2013, ArXiv.

[10]  Radhika M. Pai,et al.  Modeling and Verification of Kerberos Protocol Using Symbolic Model Verifier , 2011, 2011 International Conference on Communication Systems and Network Technologies.

[11]  Khaled Elleithy,et al.  Effect of Temperature on The Performance of a Cylindrical Microstrip Printed Antenna for Tm01 Mode Using Different Substrates , 2011 .

[12]  Xiaolei Dong,et al.  Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..

[13]  Brian Hayes,et al.  What Is Cloud Computing? , 2019, Cloud Technologies.

[14]  Farzad Sabahi,et al.  Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[15]  Toby Velte,et al.  Cloud Computing, A Practical Approach , 2009 .

[16]  Zhang Min,et al.  Study on Cloud Computing Security , 2011 .

[17]  Ahmed Atwan,et al.  Mobile agents' authentication using a proposed light Kerberos system , 2014, 2014 9th International Conference on Informatics and Systems.