Proposing a new version of kerberos authentication protocol using ECC and threshold cryptography for cloud security
MetadataShow full item record
Nowadays cloud computing has become inevitable in every spheres of our work, that means not only in business sectors but also in nonbusiness related task. As it has many beneficial aspects we are relying on cloud computing day by day .The more we are depending on cloud computing, the more security issues are rising. Although there are some existing protocol which are serving security for users information in cloud, at present they are not secure enough to protect users’ information in cloud. Kerberos authentication protocol is one of them which was once highly secured to authenticate data but with the passage of time and with the advancement of technology Kerberos authentication protocol is no longer that much secure. To improve its performances, many authors have proposed different kinds of model with a very common and popular public key cryptography called RSA cryptography. Of course RSA public key cryptography is good but it has some flaws which make this cryptography less efficient. As a result in our research we are trying to bring a new approach of using cloud more securely. Here, we are implementing Kerberos authentication process with Elliptic Curve Cryptography (ECC) as well as Threshold Cryptography to provide secure transaction of data which will be hard to break by third party or intruder, increase memory efficiency, cost efficiency as well as reduce the burden of computation. It acts as a third party between cloud server and clients to allow authorized and secure access to cloud services. We have also shown that why ECC public key cryptography is more appropriate than RSA public key cryptography.