Authentication Mechanism to Access Multiple-Domain Multimedia Data

  • Juan Alejandro Ibañez-Ramírez
  • Francisco de Asís López-FuentesEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 833)


Today most data is stored in remote sites that are usually distributed systems. The increase of virus, trojans or ramsomware has led to the implementation of security mechanisms to protect the access to data and guarantee their privacy and integrity. Important security issues to be considered in a computer system are the authentication and access control. Authentication provides proof of identity, while access control limits the actions or operations that a legitimate user of a computer system can perform. However, both authentication and access control are strongly related, because access control assumes that the authentication of the user has been previously successfully verified. Likewise, strong authentication methods requires to integrate cryptography techniques. This paper introduces and evaluates an authentication mechanism to access distributed data in a multi-domains environment. Authentication mechanism based on Kerberos uses encryption of messages and data. Interoperability between domains allows clients and servers that belong to different domains to offer data or services among them for previously authenticated users.


Security Authentication Access control Kerberos 


  1. 1.
    Neumann, B.C., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Commun. Mag. 32(9), 33–38 (1994)CrossRefGoogle Scholar
  2. 2.
    López-Fuentes, F.A.: Sistemas Distribuidos, UAM, Unidad Cuajimalpa, pp. 1–203 (2015)Google Scholar
  3. 3.
    MIT Kerberos Consortium: The Role of Kerberos in Modern Information Systems, pp. 1–53 (2008)Google Scholar
  4. 4.
    MIT Kerberos Consortium, Why is Kerberos a credible security solution? pp. 1–13 (2008)Google Scholar
  5. 5.
    Bishop, M.: Introduction to Computer Security, Pearson Education, Inc. pp. 2–3, 97 (2005)Google Scholar
  6. 6.
    Symantec: Informe sobre las amenazas para la seguridad en Internet de 2017. Junio-2017 (2017).
  7. 7.
    Stallings, W.: Fundamentos de Seguridad en Redes Aplicaciones y Estándares, Pearson Educación, pp. 28, 31–32, 35, 106, 109 (2004)Google Scholar
  8. 8.
    Wireshark. Accessed 6 May 2018
  9. 9.
    Hojabri, M., Venkat, R.K.: Innovation in cloud computing: implementation of Kerberos version 5 in cloud computing in order to enhance the security issues. In: IEEE International Conference on Information Communication and Embedded Systems (ICICES), India (2013)Google Scholar
  10. 10.
    Al-Ayed, F., Liu, H.: Synopsis of security: using Kerberos method to secure file transfer sessions. In: IEEE International Conference on Computational Science and Computational Intelligence, USA (2016)Google Scholar
  11. 11.
    Liu, Y., Li, Z., Sun, Y.: Distributed authentication in the cloud computing environment. In: LNCS, vol. 9532. Springer International Publishing Switzerland (2015)Google Scholar
  12. 12.
    Zhang, N., Wu, X., Yang, C., Shen, Y., Cheng, Y.: A lightweight authentication and authorization solution based on Kerberos. In: IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (2016)Google Scholar
  13. 13.
    VanDyke Software Inc. Secure File Transfer with SSH (2008)Google Scholar
  14. 14.
    Arora, M.: How secure is AES against brute force attacks. EE Times 5(7). Accessed 4 June 2018
  15. 15.
    Ibañez-Ramírez, A.: Sistema de autenticación para acceso a datos distribuidos basado en Kerberos. UAM-Cuajimalpa, Technical Report (PT-III) (2018)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Juan Alejandro Ibañez-Ramírez
    • 1
  • Francisco de Asís López-Fuentes
    • 1
    Email author
  1. 1.Universidad Autónoma Metropolitana-CuajimalpaMexico CityMexico

Personalised recommendations