• Login
    • Library Home
    View Item 
    •   BracU IR
    • School of Data and Sciences (SDS)
    • Department of Computer Science and Engineering (CSE)
    • Thesis & Report, BSc (Computer Science and Engineering)
    • View Item
    •   BracU IR
    • School of Data and Sciences (SDS)
    • Department of Computer Science and Engineering (CSE)
    • Thesis & Report, BSc (Computer Science and Engineering)
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Proposing a new version of kerberos authentication protocol using ECC and threshold cryptography for cloud security

    Thumbnail
    View/Open
    16101180,13301043,14101101_CSE.pdf (1.573Mb)
    Date
    12/24/2017
    Publisher
    BRAC University
    Author
    Sutradhar, Mukti Rani
    Sultana, Nigar
    Dey, Himel
    Metadata
    Show full item record
    URI
    http://hdl.handle.net/10361/9545
    Abstract
    Nowadays cloud computing has become inevitable in every spheres of our work, that means not only in business sectors but also in nonbusiness related task. As it has many beneficial aspects we are relying on cloud computing day by day .The more we are depending on cloud computing, the more security issues are rising. Although there are some existing protocol which are serving security for users information in cloud, at present they are not secure enough to protect users’ information in cloud. Kerberos authentication protocol is one of them which was once highly secured to authenticate data but with the passage of time and with the advancement of technology Kerberos authentication protocol is no longer that much secure. To improve its performances, many authors have proposed different kinds of model with a very common and popular public key cryptography called RSA cryptography. Of course RSA public key cryptography is good but it has some flaws which make this cryptography less efficient. As a result in our research we are trying to bring a new approach of using cloud more securely. Here, we are implementing Kerberos authentication process with Elliptic Curve Cryptography (ECC) as well as Threshold Cryptography to provide secure transaction of data which will be hard to break by third party or intruder, increase memory efficiency, cost efficiency as well as reduce the burden of computation. It acts as a third party between cloud server and clients to allow authorized and secure access to cloud services. We have also shown that why ECC public key cryptography is more appropriate than RSA public key cryptography.
    Keywords
    Cloud computing; RSA cryptography; Elliptic Curve Cryptography; ECC
     
    Description
    Cataloged from PDF version of thesis report.
     
    Includes bibliographical references (pages 60-61).
     
    This thesis report is submitted in partial fulfilment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2017.
    Department
    Department of Computer Science and Engineering, BRAC University
    Collections
    • Thesis & Report, BSc (Computer Science and Engineering)

    Copyright © 2008-2019 Ayesha Abed Library, Brac University 
    Contact Us | Send Feedback
     

     

    Policy Guidelines

    • BracU Policy
    • Publisher Policy

    Browse

    All of BracU Institutional RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Statistics

    View Usage Statistics

    Copyright © 2008-2019 Ayesha Abed Library, Brac University 
    Contact Us | Send Feedback