High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

An Effective Third Party Auditing in Private Cloud using Kerberos

Author(s):

Indra Priyadharshini S , R M K College of Engineering and Technology; Akila K, R M K College of Engineering and Technology; Sathish Kumar, Cognizant Technology Solutions

Keywords:

Cloud Computing, Third Party Auditor, Kerberos Protocol, LDAP

Abstract

Cloud computing is the emerging phase in the Internet's evolution, where it provides means through which power of computing, infrastructure of computing, computer applications and other business services can be delivered to businesses and individual as a service wherever and whenever they need. Using cloud storage, users can store their data remotely and enjoy the required high-quality applications and services from a shared pool of Configurable computing resource without the burden of local data storage and maintenance. A directory server is created that allows its registered users to access server information with remote logins that are secured by Kerberos authentication protocol (Third party Auditing-TPA) for secure communication over insecure channels. The original password or user credential, does not travel in the network and thus the transaction is more secure. Unlike usual authentications which verify login credentials with stored credentials, Kerberos authentication works by using the concept of principal credentials that are temporary credentials and temporary keys that are time stamped. A key distribution center manages production of tokens. Verification is done by a two way authentication of the principal login credentials by combining the generated token and the principal login in an encryption decryption process along with the stored credentials.

Other Details

Paper ID: IJSRDV3I2734
Published in: Volume : 3, Issue : 2
Publication Date: 01/05/2015
Page(s): 1029-1032

Article Preview

Download Article