Elliptical Curve Cryptography-Kerberos Authentication Model for Keystone in Open Stack

  • Veeramani Shamugam
  • Iain Murray
  • Amandeep S. Sidhu
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 752)


Cloud computing is a fastly developing technology, which will be a ubiquitous service in coming days. Cloud has additionally focalized numerous apparently unique components, for example, storage, compute, and so forth into a unified infrastructure. OpenStack is one of the eminent cloud computing programming in the cloud group. It is conveyed as Infrastructure as a Service, which implies and permits the clients to provision their own machines in cloud by utilizing its components, similar to computation, storage, and so on. Keeping in mind about the end goal to give such services, whereas OpenStack needs to verify its clients. The component in OpenStack that plays out this capacity is called Keystone. In Keystone, the present component has to give a token to the requesting clients, which is then given to different services from where the clients ask for particular services (e.g. storage, compute and so forth). In this paper, ECC-Kerberos based authentication model is examined and formulated for OpenStack. The key distribution of this examination is to increase the comprehension of the possibility of Kerberos in OpenStack with the end goal of authentication. A noteworthy advantage is that the authentication model in OpenStack can then be founded as an outstanding and very much high in standard. This proposed authentication model is implemented. The evaluation and demonstration of this implementation is also presented.


Cloud computing OpenStack Key stone Kerberos authentication Elliptical curve cryptography 


  1. 1.
    Petrillo, F., et al.: Towards a REST cloud computing lexicon. In: 7th International Conference on Cloud Computing and Services Science, CLOSER 2017 (2017)Google Scholar
  2. 2.
    Vyas, U.: Deploying multi-node cluster. In: Applied OpenStack Design Patterns, pp. 51–63. Apress (2016)Google Scholar
  3. 3.
    Chekam, T.T., et al.: On the synchronization bottleneck of openstack swift-like cloud storage systems. In: IEEE International Conference on Computer Communications, San Francisco, CA pp. 10–15, April 2016. IEEE Xplore® (2016)Google Scholar
  4. 4.
    Antonov, N.: OpenStack in Enterprise (2016)Google Scholar
  5. 5.
    Cash, S., et al.: Managed infrastructure with IBM cloud OpenStack services. IBM J. Res. Dev. 60(2-3), 1–6 (2016)CrossRefGoogle Scholar
  6. 6.
    Pérez Méndez, A., et al.: Integrating an AAA‐based federation mechanism for OpenStack—the CLASSe view. Concurr. Comput.: Pract. Exp. (2017)Google Scholar
  7. 7.
    Shanmugam, V., et al.: Software defined networking challenges and future direction: a case study of implementing SDN features on OpenStack private cloud. In: IOP Conference Series: Materials Science and Engineering, vol. 121, no. 1. IOP Publishing (2016)Google Scholar
  8. 8.
    Vo Van, N., Chi, L.M., Long, N.Q., Nguyen, G.N., Le, D.-N.: A performance analysis of OpenStack open-source solution for IaaS cloud computing. In: Satapathy, S.C., Raju, K.S., Mandal, J.K., Bhateja, V. (eds.) Proceedings of the Second International Conference on Computer and Communication Technologies. AISC, vol. 380, pp. 141–150. Springer, New Delhi (2016). doi: 10.1007/978-81-322-2523-2_13 CrossRefGoogle Scholar
  9. 9.
    Lima, S., Rocha, A.: A view of OpenStack: toward an open-source solution for cloud. In: Rocha, Á., Correia, A.M., Adeli, H., Reis, L.P., Costanzo, S. (eds.) WorldCIST 2017. AISC, vol. 569, pp. 481–491. Springer, Cham (2017). doi: 10.1007/978-3-319-56535-4_49 CrossRefGoogle Scholar
  10. 10.
    Jakóbik, A.: A cloud-aided group RSA scheme in Java 8 environment and OpenStack software. J. Telecommun. Inf. Technol. 2, 53 (2016)Google Scholar
  11. 11.
    Sabapathi, V., Visu, P., Varun kumar, K.A.: A hybrid cloud architecture for secure service—measures against poodle vulnerability. In: Suresh, L.P., Panigrahi, B.K. (eds.) Proceedings of the International Conference on Soft Computing Systems. AISC, vol. 398, pp. 707–713. Springer, New Delhi (2016). doi: 10.1007/978-81-322-2674-1_67 CrossRefGoogle Scholar
  12. 12.
    Symeonidis, H.: Cloud Computing security for efficient Big Data delivery (2016)Google Scholar
  13. 13.
    Anisetti, M., et al.: Toward security and performance certification of open stack. In: 2015 IEEE 8th International Conference on Cloud Computing (CLOUD). IEEE (2015)Google Scholar
  14. 14.
    Kamboj, R., Arya, A.: OpenStack: open source cloud computing IaaS platform. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(5) (2014)Google Scholar
  15. 15.
    Sefraoui, O., Aissaoui, M., Eleuldj, M.: OpenStack: toward an open-source solution for cloud computing. Int. J. Comput. Appl. 55(3) (2012)Google Scholar
  16. 16.
    Khan, R.H., Ylitalo, J., Ahmed, A.S.: OpenID authentication as a service in OpenStack. In: 2011 7th International Conference on Information Assurance and Security (IAS). IEEE (2011)Google Scholar
  17. 17.
    Jayaram, K.R., Milenkoski, A., Kounev, S.: Software architectures for self-protection in IaaS clouds. In: Kounev, S., Kephart, J., Milenkoski, A., Zhu, X. (eds.) Self-Aware Computing Systems, pp. 611–631. Springer, Cham (2017). doi: 10.1007/978-3-319-47474-8_21 CrossRefGoogle Scholar
  18. 18.
    Markelov, A.: Certified OpenStack Administrator Study Guide (2016)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  • Veeramani Shamugam
    • 1
  • Iain Murray
    • 2
  • Amandeep S. Sidhu
    • 3
  1. 1.Department of Electrical and Computer Engineering, Faculty of Engineering and SciencesCurtin UniversityMiriMalaysia
  2. 2.Department of Electrical and Computer Engineering, Faculty of Science and EngineeringCurtin UniversityBentley, PerthAustralia
  3. 3.Curtin Malaysia Research InstituteCurtin UniversityMiriMalaysia

Personalised recommendations