Kerberos System to Cloud for Virtual Resource Authentication

Kerberos System to Cloud for Virtual Resource Authentication
Authors : N. Sundareswaran, A. D. C. Navin Dhinnesh, S. S. Akilan
Publication Date: 10-03-2017


Author(s):  N. Sundareswaran, A. D. C. Navin Dhinnesh, S. S. Akilan

Published in:   International Journal of Engineering Research & Technology

License:  This work is licensed under a Creative Commons Attribution 4.0 International License.

Website: www.ijert.org

Volume/Issue:   Volume. 6 - Issue. 03 , March - 2017

e-ISSN:   2278-0181

 DOI:  http://dx.doi.org/10.17577/IJERTV6IS030084


The security of the virtual network will not benefit from using authentication method with the most promise for security unless both the way it is coded and the way it is implemented is equally as secure. It is essential to choose strong authentication algorithms which enforce good protection. The importance of the resource authentication process is the ability of the client to access and use the resource. A pseudo code was developed for the data center which is used to authenticate the client to use the resource. Our cloud infrastructure suggests using certificate based authentication for this sensitive access of the cloud. We can use encryption to protect stored passwords in the data center. We are using symmetric key algorithm, Advanced Encryption Standard with stretching the block size for this purpose. The data center does not keep all documents at one place. It keeps transposition the order of the documents in different virtual servers. There is no known attack for the Kerberos system till now which motivates us to involve this system to the cloud for resource authentication.


Number of Citations for this article:  Data not Available


Key Word(s):    


Number of Downloads:     20

Call for Papers - May - 2017



                 Call for Thesis - 2017 

     Publish your Ph.D/Master's Thesis Online

              Publish Ph.D Master Thesis Online as Book