Abstract
The cloud computing is considered as the next-generation of IT technology that can provide various elastic and scalable IT services in pay-as-you-go. This technology has been used by worldwide companies to improve their business performance. Therefore, authentication of both clients and services is a significant issue for the trust and security of the cloud computing. At present, to protect the security of the cloud, many ideas have been proposed. In this paper, we present DSA protocol concentrated on authentication of clients. It is an improved protocol based on Kerberos, which prevents password guessing attack by using dynamic session key. We also solved the problem of service availability by introducing two additional messages in the scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Armbrust, M., Fox, A., Griffith, R., et al.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)
Marinos, A., Briscoe, G.: Community cloud computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol. 5931, pp. 472–484. Springer, Heidelberg (2009)
Velte, T., Velte, A., Elsenpeter, R.: Cloud Computing, a Practical Approach. McGraw-Hill, Inc., New York (2009)
Qian, L., Luo, Z., Du, Y., Guo, L.: Cloud computing: an overview. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol. 5931, pp. 626–631. Springer, Heidelberg (2009)
Boss, G., Malladi, P., Quan, D., et al.: Cloud computing. IBM white paper, vol. 1 (2007)
Wei, L., Zhu, H., Cao, Z., et al.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371–386 (2014)
Feng, D.G., Zhang, M., Zhang, Y., et al.: Study on cloud computing security. J. Softw. 22(1), 71–83 (2011)
So, K.: Cloud computing security issues and challenges. Int. J. Comput. Netw. 3(5), 1–9 (2011)
Sabahi, F.: Cloud computing security threats and responses. In: 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN), pp. 245–249. IEEE (2011)
Talon, C., Insights, I.D.C.E.: The impact of cloud computing on the development of intelligent buildings. CABA Intell. Integr. Build. Counc. (IIBC), pp. 1–29 (2013)
Zunnurhain, K., Vrbsky, S.: Security attacks and solutions in clouds. In: Proceedings of the 1st International Conference on Cloud Computing, pp. 145–156 (2010)
Malandrino, D., Petta, A., Scarano, V., et al.: Privacy awareness about information leakage: who knows what about me?. In: Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, pp. 279–284. ACM (2013)
Quinn, B., Arthur, C.: PlayStation network hackers access data of 77 million users. Guardian (2011)
Al-Janabi, S.T.F., Rasheed, M.A.: Public-key cryptography enabled Kerberos authentication. In: Developments in E-systems Engineering (DeSE), pp. 209–214. IEEE (2011)
Mundra, P., Shukla, S., Sharma, M., et al.: Modeling and verification of Kerberos protocol using symbolic model verifier. In: 2011 International Conference on Communication Systems and Network Technologies (CSNT), pp. 651–654. IEEE (2011)
Dua, G., Gautam, N., Sharma, D., et al.: Replay attack prevention in Kerberos authentication protocol using triple password. Int. J. Comput. Netw. Commun. 5(2), 59 (2013)
Wang, C., Feng, C.: Security analysis and improvement for Kerberos based on dynamic password and Diffie-Hellman algorithm. In: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), pp. 256–260. IEEE (2013)
Du, Y., Ning, H., Yang, P., et al.: Improvement of Kerberos protocol based on dynamic password and “One-time public key”. In: 2014 10th International Conference on Natural Computation (ICNC), pp. 1020–1025. IEEE (2014)
Kandil, H., Atwan, A.: Mobile agents’ authentication using a proposed light Kerberos system. In: 2014 9th International Conference on Informatics and Systems (INFOS), pp. CNs-39–CNs-45. IEEE (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Liu, Y., Li, Z., Sun, Y. (2015). Distributed Authentication in the Cloud Computing Environment. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9532. Springer, Cham. https://doi.org/10.1007/978-3-319-27161-3_74
Download citation
DOI: https://doi.org/10.1007/978-3-319-27161-3_74
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27160-6
Online ISBN: 978-3-319-27161-3
eBook Packages: Computer ScienceComputer Science (R0)