Skip to main content

Distributed Authentication in the Cloud Computing Environment

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9532))

Abstract

The cloud computing is considered as the next-generation of IT technology that can provide various elastic and scalable IT services in pay-as-you-go. This technology has been used by worldwide companies to improve their business performance. Therefore, authentication of both clients and services is a significant issue for the trust and security of the cloud computing. At present, to protect the security of the cloud, many ideas have been proposed. In this paper, we present DSA protocol concentrated on authentication of clients. It is an improved protocol based on Kerberos, which prevents password guessing attack by using dynamic session key. We also solved the problem of service availability by introducing two additional messages in the scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Armbrust, M., Fox, A., Griffith, R., et al.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)

    Article  Google Scholar 

  2. Marinos, A., Briscoe, G.: Community cloud computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol. 5931, pp. 472–484. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  3. Velte, T., Velte, A., Elsenpeter, R.: Cloud Computing, a Practical Approach. McGraw-Hill, Inc., New York (2009)

    Google Scholar 

  4. Qian, L., Luo, Z., Du, Y., Guo, L.: Cloud computing: an overview. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol. 5931, pp. 626–631. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  5. Boss, G., Malladi, P., Quan, D., et al.: Cloud computing. IBM white paper, vol. 1 (2007)

    Google Scholar 

  6. Wei, L., Zhu, H., Cao, Z., et al.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371–386 (2014)

    Article  Google Scholar 

  7. Feng, D.G., Zhang, M., Zhang, Y., et al.: Study on cloud computing security. J. Softw. 22(1), 71–83 (2011)

    Article  Google Scholar 

  8. So, K.: Cloud computing security issues and challenges. Int. J. Comput. Netw. 3(5), 1–9 (2011)

    Article  Google Scholar 

  9. Sabahi, F.: Cloud computing security threats and responses. In: 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN), pp. 245–249. IEEE (2011)

    Google Scholar 

  10. Talon, C., Insights, I.D.C.E.: The impact of cloud computing on the development of intelligent buildings. CABA Intell. Integr. Build. Counc. (IIBC), pp. 1–29 (2013)

    Google Scholar 

  11. Zunnurhain, K., Vrbsky, S.: Security attacks and solutions in clouds. In: Proceedings of the 1st International Conference on Cloud Computing, pp. 145–156 (2010)

    Google Scholar 

  12. Malandrino, D., Petta, A., Scarano, V., et al.: Privacy awareness about information leakage: who knows what about me?. In: Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, pp. 279–284. ACM (2013)

    Google Scholar 

  13. Quinn, B., Arthur, C.: PlayStation network hackers access data of 77 million users. Guardian (2011)

    Google Scholar 

  14. Al-Janabi, S.T.F., Rasheed, M.A.: Public-key cryptography enabled Kerberos authentication. In: Developments in E-systems Engineering (DeSE), pp. 209–214. IEEE (2011)

    Google Scholar 

  15. Mundra, P., Shukla, S., Sharma, M., et al.: Modeling and verification of Kerberos protocol using symbolic model verifier. In: 2011 International Conference on Communication Systems and Network Technologies (CSNT), pp. 651–654. IEEE (2011)

    Google Scholar 

  16. Dua, G., Gautam, N., Sharma, D., et al.: Replay attack prevention in Kerberos authentication protocol using triple password. Int. J. Comput. Netw. Commun. 5(2), 59 (2013)

    Google Scholar 

  17. Wang, C., Feng, C.: Security analysis and improvement for Kerberos based on dynamic password and Diffie-Hellman algorithm. In: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), pp. 256–260. IEEE (2013)

    Google Scholar 

  18. Du, Y., Ning, H., Yang, P., et al.: Improvement of Kerberos protocol based on dynamic password and “One-time public key”. In: 2014 10th International Conference on Natural Computation (ICNC), pp. 1020–1025. IEEE (2014)

    Google Scholar 

  19. Kandil, H., Atwan, A.: Mobile agents’ authentication using a proposed light Kerberos system. In: 2014 9th International Conference on Informatics and Systems (INFOS), pp. CNs-39–CNs-45. IEEE (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhi Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Liu, Y., Li, Z., Sun, Y. (2015). Distributed Authentication in the Cloud Computing Environment. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9532. Springer, Cham. https://doi.org/10.1007/978-3-319-27161-3_74

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27161-3_74

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27160-6

  • Online ISBN: 978-3-319-27161-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics