Authentication and authorization in cloud computing using kerberos

The emergence of cloud computing paradigm offers attractive and innovative computing services. Cloud providers deliver various types of computing services to customers according to a pay-per-use economic model. However, this technology introduces a new concern for enterprises and businesses regardin...

Full description

Bibliographic Details
Main Author: Hidar, Ahmad M. Saeed (Author)
Format: Thesis
Published: 2014-01.
Subjects:
Online Access:Get fulltext
LEADER 02297 am a22001573u 4500
001 41594
042 |a dc 
100 1 0 |a Hidar, Ahmad M. Saeed  |e author 
245 0 0 |a Authentication and authorization in cloud computing using kerberos 
260 |c 2014-01. 
520 |a The emergence of cloud computing paradigm offers attractive and innovative computing services. Cloud providers deliver various types of computing services to customers according to a pay-per-use economic model. However, this technology introduces a new concern for enterprises and businesses regarding their privacy and security. Security as a Service is a new cloud service model for the security enhancement of a cloud environment. This is a way of centralizing security solutions under the control of professional security specialists. Authentication and authorization services are parts of cloud security services. This study focused on Authentication and authorization solutions for cloud environments. More specifically, architecture of a cloud security system is designed and proposed for providing two identity services for cloud-based systems: authentication and authorization. The main contribution of this study is to implement these services using Kerberos protocol, which will enable cloud-based application service providers to manage their users in an open, flexible, interoperable and secure environment. The methods of the proposed services are necessary for managing and providing those identity services. The implementation and specification of each service is described and explained, a prototype system of an authentication and authorization services are implemented and tested. The implementation is done using Web Service technology; it is shown that both services are at least computationally secure against potential security risks associated with different types of attacks. The security of Kerberos protocol that has been implemented for authentication ensures a secure and reliable environment for cloud-based application services, which is very easy to deploy and exploit on cloud-based platforms. 
546 |a en 
650 0 4 |a QA76 Computer software 
655 7 |a Thesis 
787 0 |n http://eprints.utm.my/id/eprint/41594/ 
856 |z Get fulltext  |u http://eprints.utm.my/id/eprint/41594/5/AhmadMSaeedHidarMFSKSM2014.pdf