Kerberos System Based Security Model Using Two Factor Authentication for Cloud Computing

  • Authors

    • Young-Soo Kim
    • Byoung Yup Lee
    2018-12-13
    https://doi.org/10.14419/ijet.v7i4.39.25578
  • Kerberos System, Security Model, Challenge Response, Two Factor Authentication, Authorization, Cloud Computing
  • Background/Objectives: The authentication technology is important in the cloud environment where many users and data are mixed. Therefore, we suggest a Kerberos-based Two Factor Authentication model to address the vulnerability of password.

    Methods/Statistical analysis: We design and implement our suggested model. To check the practicality of cloud computing security model adopting Kerberos system based authentication model and Two Factor Authentication, we materialized authentication security model and authorization model.

    Findings: In order to decrease the vulnerability of the password, we suggests Kerberos system based Two Factor Authentication model. We found that the suggested model has no errors in running, ensures security and confidentiality of information of the user when applied to the cloud environment to prevent cyber attacks targeting cloud services,and is resistant to cloud server attack by an attacker so that it can be the solution.

    Improvements/Applications: Our suggested model ensures the security and confidentiality of information of a user when applied to the cloud that underlies a variety of application fields such as big data so that it can prevent cyber attacks targeting cloud services and contribute to activation of cloud computing.

     

  • References

    1. [1] F. Cheng, Security attack safe mobile and cloud-based one-time password tokens using rubbing encryption algorithm, Mobile Networks and Applications pp.304-336, 2011.

      [2] Eldefrawy, Mohamed Hamdy, Khaled Alghathbar, and Muhammad Khurram Khan. OTP-Based Two-Factor Authentication Using Mobile Phones. Information Technology New Generations(ITNG), Eighth International Conference on. IEEE, pp. 327-331, 2011.

      [3] FadiAloul, Syed Zahidi, Wassim El-Hajj, Two Factor Authentication Using Mobile Phones. IEEE/ACS International Conference on Computer Systems and application, pp. 641-644, 2009.

      [4] Temkar, Rohini, Comparative Approach to Cloud Security Model, Springer Advaces in Computing, Communication and Control, Vol.125, pp 170-177, Jan 2011.Forman, G. 2003.

      [5] Ganseo Zhao, ChunMingRong, Jin Li, Feng Zhang and YongTang, Trusted Data Sharing Over Untrusted Cloud Storage, IEEE International Conference on Cloud Computing Technology and Science, pp 97-103, Dec 2010.

      [6] Hojabri M., Rao K. V., Innovation in cloud computing :Implementation of kerberos version5 in cloud computing in order to enhance the security issue, ICICES2013, pp452-456, 2013.

      [7] H.M.N Al-Hamadi, C.Y. Yeun, M.J. Zemerly, and M. Al Qutayari, Distributed Lightweight Kerberos Protocol for Mobile Agent System, IEEE GCC2011, pp.233-236, 2011.

      [8] InshilDoh, KijoonChae, Jiyoung Lim and Min Young Chung, An Improved Security Approach Based on Kerberos for M2M Open IPTV System, Tthe 15 International Conference on NBiS2012, pp.754-759, 2012.

      [9] Abdul Raouf Khan, “Access Control in Cloud Computing Environmentâ€, APPN Journal of Engineering and Applied Sciences, Vol.7, No.5, pp.613-615, 2012.

      [10] A. M. Axel Buecker. Protecting Data Assets by Deploying a Multi-Factor Authentication Solution with End-to-End Encryption. Technical report, IBM, 2013.

  • Downloads

  • How to Cite

    Kim, Y.-S., & Yup Lee, B. (2018). Kerberos System Based Security Model Using Two Factor Authentication for Cloud Computing. International Journal of Engineering & Technology, 7(4.39), 677-680. https://doi.org/10.14419/ijet.v7i4.39.25578