Show simple item record

dc.contributor.advisorArif, Hossain
dc.contributor.authorSutradhar, Mukti Rani
dc.contributor.authorSultana, Nigar
dc.contributor.authorDey, Himel
dc.date.accessioned2018-02-25T07:46:06Z
dc.date.available2018-02-25T07:46:06Z
dc.date.copyright2017
dc.date.issued12/24/2017
dc.identifier.otherID 16101180
dc.identifier.otherID 13301043
dc.identifier.otherID 14101101
dc.identifier.urihttp://hdl.handle.net/10361/9545
dc.descriptionCataloged from PDF version of thesis report.
dc.descriptionIncludes bibliographical references (pages 60-61).
dc.descriptionThis thesis report is submitted in partial fulfilment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2017.en_US
dc.description.abstractNowadays cloud computing has become inevitable in every spheres of our work, that means not only in business sectors but also in nonbusiness related task. As it has many beneficial aspects we are relying on cloud computing day by day .The more we are depending on cloud computing, the more security issues are rising. Although there are some existing protocol which are serving security for users information in cloud, at present they are not secure enough to protect users’ information in cloud. Kerberos authentication protocol is one of them which was once highly secured to authenticate data but with the passage of time and with the advancement of technology Kerberos authentication protocol is no longer that much secure. To improve its performances, many authors have proposed different kinds of model with a very common and popular public key cryptography called RSA cryptography. Of course RSA public key cryptography is good but it has some flaws which make this cryptography less efficient. As a result in our research we are trying to bring a new approach of using cloud more securely. Here, we are implementing Kerberos authentication process with Elliptic Curve Cryptography (ECC) as well as Threshold Cryptography to provide secure transaction of data which will be hard to break by third party or intruder, increase memory efficiency, cost efficiency as well as reduce the burden of computation. It acts as a third party between cloud server and clients to allow authorized and secure access to cloud services. We have also shown that why ECC public key cryptography is more appropriate than RSA public key cryptography.en_US
dc.description.statementofresponsibilityMukti Rani Sutradhar
dc.description.statementofresponsibilityNigar Sultana
dc.description.statementofresponsibilityHimel Dey
dc.format.extent62 pages
dc.language.isoenen_US
dc.publisherBRAC Universityen_US
dc.rightsBRAC University thesis reports are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission.
dc.subjectCloud computingen_US
dc.subjectRSA cryptographyen_US
dc.subjectElliptic Curve Cryptographyen_US
dc.subjectECCen_US
dc.titleProposing a new version of kerberos authentication protocol using ECC and threshold cryptography for cloud securityen_US
dc.typeThesisen_US
dc.contributor.departmentDepartment of Computer Science and Engineering, BRAC University
dc.description.degreeB. Computer Science and Engineering


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record