scholarly journals A Tpa-Authentication Scheme for Public Cloud Using Kerberos Protocol

2017 ◽  
Vol 10 (2) ◽  
pp. 460-466
Author(s):  
Arpit Agrawal ◽  
Shubhangi Verma

Cloud computing is the new generation technology provides the way of sharing of resources, memory, software anything in the form of service using internet. Security is an important and unique phenomenon gives safe and isolated environment. Security model and principles are defined to implement security features with any applications. Confidentiality, authentication and integrity are primary principles for trust establishment. Existing work only concentrates on integrity concept and does not imposes for authentication or access control. A Kerberos based strong authentication scheme has been generated using third party auditing concept to improve the strength of authentication as well as trust on CSP. This work will implement security service architecture to create Kerberos environment and establish communication between Kerberos and CSP. The complete work will be implemented using Java technology and Open Stack serve for public cloud environment.

Author(s):  
Vitthal Sadashiv Gutte ◽  
Sita Devulapalli

Correctness of data and efficient mechanisms for data security, while transferring the file to and from Cloud, are of paramount importance in today's cloud-centric processing. A mechanism for correctness and efficient transfer of data is proposed in this article. While processing users request data, a set of attributes are defined and checked. States with attributes at different levels are defined to prevent unauthorized access. Security is provided while storing the data using a chunk generation algorithm and verification of chunks using lightweight Third-Party Auditor (TPA). TPA uses digital signatures to verify user's data that are generated by RSA with MD5 algorithms. The metadata file of generated chunks is encrypted using a modified AES algorithm. The proposed method prevents unauthorized users from accessing the data in the cloud environment, in addition to maintaining data integrity. Results of the proposed cloud security model implementation are discussed.


Author(s):  
T. V. Kovalinska ◽  
А. G. Zelinskyi ◽  
V. I. Sakhno ◽  
О. М. Fainleib ◽  
D. Yu. Kolesnik ◽  
...  

2020 ◽  
Vol 62 (5-6) ◽  
pp. 287-293
Author(s):  
Felix Günther

AbstractSecure connections are at the heart of today’s Internet infrastructure, protecting the confidentiality, authenticity, and integrity of communication. Achieving these security goals is the responsibility of cryptographic schemes, more specifically two main building blocks of secure connections. First, a key exchange protocol is run to establish a shared secret key between two parties over a, potentially, insecure connection. Then, a secure channel protocol uses that shared key to securely transport the actual data to be exchanged. While security notions for classical designs of these components are well-established, recently developed and standardized major Internet security protocols like Google’s QUIC protocol and the Transport Layer Security (TLS) protocol version 1.3 introduce novel features for which supporting security theory is lacking.In my dissertation [20], which this article summarizes, I studied these novel and advanced design aspects, introducing enhanced security models and analyzing the security of deployed protocols. For key exchange protocols, my thesis introduces a new model for multi-stage key exchange to capture that recent designs for secure connections establish several cryptographic keys for various purposes and with differing levels of security. It further introduces a formalism for key confirmation, reflecting a long-established practical design criteria which however was lacking a comprehensive formal treatment so far. For secure channels, my thesis captures the cryptographic subtleties of streaming data transmission through a revised security model and approaches novel concepts to frequently update key material for enhanced security through a multi-key channel notion. These models are then applied to study (and confirm) the security of the QUIC and TLS 1.3 protocol designs.


Author(s):  
Md Equebal Hussain ◽  
Mohammad Rashid Hussain

security is one of the most important concern on cloud computing therefore institutions are hesitating to host their data over cloud. Not all data can be afforded to move on the cloud (example accounts data). The main purpose of moving data over cloud is to reduce cost (infrastructure and maintenance), faster performance, easy upgrade, storage capacity but at the same time security is major concern because cloud is not private but maintained by third party over the internet, security issues like privacy, confidentiality, authorization (what you are allowed to do), authentication (who you are) and accounting (what you actually do) will be encountered. Variety of encryption algorithms required for higher level of security. In this paper we try to provide solution for better security by proposing a combined method of key exchange algorithm with encryption technique. Data stored in cloud can be protected from hackers using proposed solution because even if transmitted key is hacked of no use without user’s private key.


Author(s):  
Jitendra Singh ◽  
Vikas Kumar

Regulatory compliance is equally binding on small and medium business groups. Owing to the small scale and limited budget, such SMBs are unable to seek expert advice. To adequately guard the SMBs in regulatory compliance, the present work proposed a third-party managed-end user-driven approach that renders the list of regulatory acts applicable in one's case according to the country of one's residence, services subscribed, and type of the operations to be carried out in subscribed cloud paradigm. The list of applicable regulatory acts are rendered at the subscriber's end only. In addition, the proposed method notifies the present state of compliance of under-considered cloud providers. Based on the recommendation received, the subscriber can proceed with his decision to subscribe or not to subscribe in the event if desired compliances do not exist. This technological assistance will eliminate the need to possess the required knowledge in regulatory acts or seeking advice from the regulatory expert.


Author(s):  
Rewindy Astari Surbakti ◽  
Doddy Yuono

The 21st century is known as the industrial revolution 4.0 which changes the economy among people who grow together with modernity and technology systems. It proves that the development of human thinking on creativity will greatly affect the development of the creative economy, but this has made the market begin to be abandoned by new generations and switch to e-commerce systems. The existence of an epidemic that has begun to spread in people's lives is also one of the factors that have changed the world economy and made the market begin to be abandoned. Changes in the world economy will require revitalization so that this is used as a foundation in the formation of the Screen Market integrated with the digital system to polarize the economy. The new generation is the key to the development and balance of the economy in technology, this is in line with the entrepreneurial nature and character of the new generation, which makes them prefer to develop as start ups. The revitalization of the economic center will become a forum for interaction with the surrounding environment so that the characteristics of the formation of interaction space are the basis and the beginning of the screen market. The screen market is located on Jl Arjuna Utara which is surrounded by malls, offices, universities, making the type of retail being marketed a creative sub-sector, namely culinary with local products, fashion retail, and also craft retail managed by start ups so it is hoped that the screen market can accommodate interaction and creatively combined with digital developments. Keywords: Economy; Market; New Generation; Technology. Abstrak Abad ke-21 dikenal dengan terjadinya revolusi industri 4.0 yang mengubah  perekonomian  di kalangan masyarakat yang bertumbuh bersama dengan sistem modernitas dan juga teknologi. Membuktikan bahwa perkembangan pemikiran manusia terhadap kreativitas akan sangat memengaruhi perkembangan ekonomi kreatif tetapi hal ini menjadikan pasar mulai ditinggalkan oleh generasi baru dan beralih pada sistem e-commerce. Adanya wabah yang mulai merambat dikehidupan masyarakat juga menjadi salah satu faktor yang merubah perekonomian dunia dan menjadikan pasar mulai ditinggalkan. Perubahan perekonomian dunia ini akan membutuhkan revitalisasi sehingga hal ini dijadikan sebagai landasan pijakan dalam pembentukan Pasar Layar yang dipadukan dengan sistem dari digital sebagai polarisasi perekonomian. Generasi baru merupakan kunci dari perkembangan dan keseimbangan perekonomian dalam teknologi, hal ini sejalan dengan sifat dan watak entrepreneur yang dimiliki oleh generasi baru sehingga menjadikan mereka lebih memilih berkembang sebagai start up. Revitalisasi pusat perekonomian ini akan menjadi wadah interaksi dengan lingkungan sekitar sehingga adanya karakteristik pembentukan ruang interaksi sebagai dasar dan awal dalam pasar layar. Pasar layar berada di Jl. Arjuna Utara yang dikelilingi oleh mall, kantor, universitas menjadikan jenis retail yang dipasarkan merupakan subsektor kreatif yaitu kuliner dengan produk lokal, retail fashion dan juga retail kriya yang dikelola start up sehingga diharapkan Pasar Layar mampu menampung antara interaksi dan kreatif  yang dipadukan dengan perkembangan digital.


Sign in / Sign up

Export Citation Format

Share Document