AsiaSim 2017: Modeling, Design and Simulation of Systems pp 633-644 | Cite as
Elliptical Curve Cryptography-Kerberos Authentication Model for Keystone in Open Stack
Abstract
Cloud computing is a fastly developing technology, which will be a ubiquitous service in coming days. Cloud has additionally focalized numerous apparently unique components, for example, storage, compute, and so forth into a unified infrastructure. OpenStack is one of the eminent cloud computing programming in the cloud group. It is conveyed as Infrastructure as a Service, which implies and permits the clients to provision their own machines in cloud by utilizing its components, similar to computation, storage, and so on. Keeping in mind about the end goal to give such services, whereas OpenStack needs to verify its clients. The component in OpenStack that plays out this capacity is called Keystone. In Keystone, the present component has to give a token to the requesting clients, which is then given to different services from where the clients ask for particular services (e.g. storage, compute and so forth). In this paper, ECC-Kerberos based authentication model is examined and formulated for OpenStack. The key distribution of this examination is to increase the comprehension of the possibility of Kerberos in OpenStack with the end goal of authentication. A noteworthy advantage is that the authentication model in OpenStack can then be founded as an outstanding and very much high in standard. This proposed authentication model is implemented. The evaluation and demonstration of this implementation is also presented.
Keywords
Cloud computing OpenStack Key stone Kerberos authentication Elliptical curve cryptographyReferences
- 1.Petrillo, F., et al.: Towards a REST cloud computing lexicon. In: 7th International Conference on Cloud Computing and Services Science, CLOSER 2017 (2017)Google Scholar
- 2.Vyas, U.: Deploying multi-node cluster. In: Applied OpenStack Design Patterns, pp. 51–63. Apress (2016)Google Scholar
- 3.Chekam, T.T., et al.: On the synchronization bottleneck of openstack swift-like cloud storage systems. In: IEEE International Conference on Computer Communications, San Francisco, CA pp. 10–15, April 2016. IEEE Xplore® (2016)Google Scholar
- 4.Antonov, N.: OpenStack in Enterprise (2016)Google Scholar
- 5.Cash, S., et al.: Managed infrastructure with IBM cloud OpenStack services. IBM J. Res. Dev. 60(2-3), 1–6 (2016)CrossRefGoogle Scholar
- 6.Pérez Méndez, A., et al.: Integrating an AAA‐based federation mechanism for OpenStack—the CLASSe view. Concurr. Comput.: Pract. Exp. (2017)Google Scholar
- 7.Shanmugam, V., et al.: Software defined networking challenges and future direction: a case study of implementing SDN features on OpenStack private cloud. In: IOP Conference Series: Materials Science and Engineering, vol. 121, no. 1. IOP Publishing (2016)Google Scholar
- 8.Vo Van, N., Chi, L.M., Long, N.Q., Nguyen, G.N., Le, D.-N.: A performance analysis of OpenStack open-source solution for IaaS cloud computing. In: Satapathy, S.C., Raju, K.S., Mandal, J.K., Bhateja, V. (eds.) Proceedings of the Second International Conference on Computer and Communication Technologies. AISC, vol. 380, pp. 141–150. Springer, New Delhi (2016). doi: 10.1007/978-81-322-2523-2_13 CrossRefGoogle Scholar
- 9.Lima, S., Rocha, A.: A view of OpenStack: toward an open-source solution for cloud. In: Rocha, Á., Correia, A.M., Adeli, H., Reis, L.P., Costanzo, S. (eds.) WorldCIST 2017. AISC, vol. 569, pp. 481–491. Springer, Cham (2017). doi: 10.1007/978-3-319-56535-4_49 CrossRefGoogle Scholar
- 10.Jakóbik, A.: A cloud-aided group RSA scheme in Java 8 environment and OpenStack software. J. Telecommun. Inf. Technol. 2, 53 (2016)Google Scholar
- 11.Sabapathi, V., Visu, P., Varun kumar, K.A.: A hybrid cloud architecture for secure service—measures against poodle vulnerability. In: Suresh, L.P., Panigrahi, B.K. (eds.) Proceedings of the International Conference on Soft Computing Systems. AISC, vol. 398, pp. 707–713. Springer, New Delhi (2016). doi: 10.1007/978-81-322-2674-1_67 CrossRefGoogle Scholar
- 12.Symeonidis, H.: Cloud Computing security for efficient Big Data delivery (2016)Google Scholar
- 13.Anisetti, M., et al.: Toward security and performance certification of open stack. In: 2015 IEEE 8th International Conference on Cloud Computing (CLOUD). IEEE (2015)Google Scholar
- 14.Kamboj, R., Arya, A.: OpenStack: open source cloud computing IaaS platform. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(5) (2014)Google Scholar
- 15.Sefraoui, O., Aissaoui, M., Eleuldj, M.: OpenStack: toward an open-source solution for cloud computing. Int. J. Comput. Appl. 55(3) (2012)Google Scholar
- 16.Khan, R.H., Ylitalo, J., Ahmed, A.S.: OpenID authentication as a service in OpenStack. In: 2011 7th International Conference on Information Assurance and Security (IAS). IEEE (2011)Google Scholar
- 17.Jayaram, K.R., Milenkoski, A., Kounev, S.: Software architectures for self-protection in IaaS clouds. In: Kounev, S., Kephart, J., Milenkoski, A., Zhu, X. (eds.) Self-Aware Computing Systems, pp. 611–631. Springer, Cham (2017). doi: 10.1007/978-3-319-47474-8_21 CrossRefGoogle Scholar
- 18.Markelov, A.: Certified OpenStack Administrator Study Guide (2016)Google Scholar