dc.contributor.advisor | Arif, Hossain | |
dc.contributor.author | Sutradhar, Mukti Rani | |
dc.contributor.author | Sultana, Nigar | |
dc.contributor.author | Dey, Himel | |
dc.date.accessioned | 2018-02-25T07:46:06Z | |
dc.date.available | 2018-02-25T07:46:06Z | |
dc.date.copyright | 2017 | |
dc.date.issued | 12/24/2017 | |
dc.identifier.other | ID 16101180 | |
dc.identifier.other | ID 13301043 | |
dc.identifier.other | ID 14101101 | |
dc.identifier.uri | http://hdl.handle.net/10361/9545 | |
dc.description | Cataloged from PDF version of thesis report. | |
dc.description | Includes bibliographical references (pages 60-61). | |
dc.description | This thesis report is submitted in partial fulfilment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2017. | en_US |
dc.description.abstract | Nowadays cloud computing has become inevitable in every spheres of our work, that means not only in business sectors but also in nonbusiness related task. As it has many beneficial aspects we are relying on cloud computing day by day .The more we are depending on cloud computing, the more security issues are rising. Although there are some existing protocol which are serving security for users information in cloud, at present they are not secure enough to protect users’ information in cloud. Kerberos authentication protocol is one of them which was once highly secured to authenticate data but with the passage of time and with the advancement of technology Kerberos authentication protocol is no longer that much secure. To improve its performances, many authors have proposed different kinds of model with a very common and popular public key cryptography called RSA cryptography. Of course RSA public key cryptography is good but it has some flaws which make this cryptography less efficient. As a result in our research we are trying to bring a new approach of using cloud more securely. Here, we are implementing Kerberos authentication process with Elliptic Curve Cryptography (ECC) as well as Threshold Cryptography to provide secure transaction of data which will be hard to break by third party or intruder, increase memory efficiency, cost efficiency as well as reduce the burden of computation. It acts as a third party between cloud server and clients to allow authorized and secure access to cloud services. We have also shown that why ECC public key cryptography is more appropriate than RSA public key cryptography. | en_US |
dc.description.statementofresponsibility | Mukti Rani Sutradhar | |
dc.description.statementofresponsibility | Nigar Sultana | |
dc.description.statementofresponsibility | Himel Dey | |
dc.format.extent | 62 pages | |
dc.language.iso | en | en_US |
dc.publisher | BRAC University | en_US |
dc.rights | BRAC University thesis reports are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. | |
dc.subject | Cloud computing | en_US |
dc.subject | RSA cryptography | en_US |
dc.subject | Elliptic Curve Cryptography | en_US |
dc.subject | ECC | en_US |
dc.title | Proposing a new version of kerberos authentication protocol using ECC and threshold cryptography for cloud security | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | Department of Computer Science and Engineering, BRAC University | |
dc.description.degree | B. Computer Science and Engineering | |