Offering a Method for Ensuring Data Storage Security in the Cloud Network by Using Kerberos Algorithm

Cloud computing or computing system of cloud network, is an emerging technology thatdramatically simplified data transition and recovery around the world and reduced substantially the costs associated with the data maintaining. Hence,it can be noted that the cloud computing industry is a lucrative industry in the virtual world. It should be noted that in the use of cloud networking, the users of these networks face some problems such as violation of privacy and security. Since the data security and privacy are the main concerns of users in the use of these networks, the encryption operation can be used as one of the solutions for security and privacy in cloud networks, though this technique itself reduces the system performance. In the present study, we proposed a new model for the encryption, which the operation was carried out through IP and secure passwords receiving. All the cryptographic operations steps in the new model derived from theKerberos algorithm.

[1]  Fabio Del Frate,et al.  Neural Networks and Support Vector Machine Algorithms for Automatic Cloud Classification of Whole-Sky Ground-Based Images , 2015, IEEE Geoscience and Remote Sensing Letters.

[2]  Luis Miguel Contreras Murillo,et al.  A service-oriented hybrid access network and clouds architecture , 2015, IEEE Communications Magazine.

[4]  Tolga Girici,et al.  Cloud Technology and Performance Improvement with Intserv over Diffserv for Cloud Computing , 2014, 2014 International Conference on Future Internet of Things and Cloud.

[5]  Sanjaya Dahal,et al.  Security Architecture for Cloud Computing Platform , 2012 .

[6]  Jaafar M. H. Elmirghani,et al.  Distributed Energy Efficient Clouds Over Core Networks , 2014, Journal of Lightwave Technology.

[7]  Xiaonan Wang IPv6-Based Vehicular Cloud Networking , 2015, IEEE Communications Letters.

[8]  Mazleena Salleh,et al.  Biometric encryption to enhance confidentiality in Cloud computing , 2014, 2014 International Symposium on Biometrics and Security Technologies (ISBAST).

[9]  Nurhilyana Anuar,et al.  The readiness of Cloud Computing: A case study in Politeknik Sultan Salahuddin Abdul Aziz Shah, Shah Alam , 2014, 2014 International Conference on Computational Science and Technology (ICCST).

[10]  Kayhan Zrar Ghafoor,et al.  The Readiness of Cloud Computing: A Case Study in Politeknik , 2014 .

[11]  Olivier Togni,et al.  Autonomic Brokerage Service for an End-to-End Cloud Networking Service Level Agreement , 2014, 2014 IEEE 3rd Symposium on Network Cloud Computing and Applications (ncca 2014).

[12]  Stefano Savazzi,et al.  Cloud-based wirelesshart networking for critical industrial monitoring and control , 2014, 2014 12th IEEE International Conference on Industrial Informatics (INDIN).