Analysis and implementation of Kerberos protocol in hybrid cloud computing environments
المؤلف
المصدر
Engineering and Technology Journal
العدد
المجلد 39، العدد 1B (31 يناير/كانون الثاني 2021)، ص ص. 41-52، 12ص.
الناشر
تاريخ النشر
2021-01-31
دولة النشر
العراق
عدد الصفحات
12
التخصصات الرئيسية
تكنولوجيا المعلومات وعلم الحاسوب
الموضوعات
الملخص EN
The concept of cloud computing has recently changed how hardware, software, and information are handled.
However, security challenges andcredibility requirements have never changed and may have increased.
Protecting cloud computing and providing security for its resources andusers is one of the critical challenges.
As a result, most users are afraid touse their resources, because many security problems must be met.
Forexample, authentication and reliability are major security constraints andmust be provided in a cloud computing environment.
There is a wide rangeof authentication protocols in use, but the researcher has recommendedthe Kerberos protocol to represent and test it in a complex environmentsuch as a mixed cloud environment.
A model has been developed to implement Kerberos authentication in ahybrid cloud computing environment to securely access the cloudcomputing services provided.
This model is represented using the OPNETModeler 14.5 simulation system.
The network efficiency was measuredbefore and after the hacker.
Findings presented in this research aresupporting the ability of the Kerberos protocol to prevent illegal access tocloud computing services, whether from within the private cloud or thepublic cloud.
While maintaining the efficient performance of the The concept of cloud computing has recently changed how hardware, software, and information are handled.
However, security challenges andcredibility requirements have never changed and may have increased.
Protecting cloud computing and providing security for its resources andusers is one of the critical challenges.
As a result, most users are afraid touse their resources, because many security problems must be met.
Forexample, authentication and reliability are major security constraints andmust be provided in a cloud computing environment.
There is a wide rangeof authentication protocols in use, but the researcher has recommendedthe Kerberos protocol to represent and test it in a complex environmentsuch as a mixed cloud environment.
A model has been developed to implement Kerberos authentication in ahybrid cloud computing environment to securely access the cloudcomputing services provided.
This model is represented using the OPNETModeler 14.5 simulation system.
The network efficiency was measuredbefore and after the hacker.
Findings presented in this research aresupporting the ability of the Kerberos protocol to prevent illegal access tocloud computing services, whether from within the private cloud or thepublic cloud.
While maintaining the efficient performance of the network
نمط استشهاد جمعية علماء النفس الأمريكية (APA)
Khalil, Turkan Ahmad. 2021. Analysis and implementation of Kerberos protocol in hybrid cloud computing environments. Engineering and Technology Journal،Vol. 39, no. 1B, pp.41-52.
https://search.emarefa.net/detail/BIM-1282614
نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)
Khalil, Turkan Ahmad. Analysis and implementation of Kerberos protocol in hybrid cloud computing environments. Engineering and Technology Journal Vol. 39, no. 1B (2021), pp.41-52.
https://search.emarefa.net/detail/BIM-1282614
نمط استشهاد الجمعية الطبية الأمريكية (AMA)
Khalil, Turkan Ahmad. Analysis and implementation of Kerberos protocol in hybrid cloud computing environments. Engineering and Technology Journal. 2021. Vol. 39, no. 1B, pp.41-52.
https://search.emarefa.net/detail/BIM-1282614
نوع البيانات
مقالات
لغة النص
الإنجليزية
الملاحظات
Includes bibliographical references : p. 51-52
رقم السجل
BIM-1282614
قاعدة معامل التأثير والاستشهادات المرجعية العربي "ارسيف Arcif"
أضخم قاعدة بيانات عربية للاستشهادات المرجعية للمجلات العلمية المحكمة الصادرة في العالم العربي
تقوم هذه الخدمة بالتحقق من التشابه أو الانتحال في الأبحاث والمقالات العلمية والأطروحات الجامعية والكتب والأبحاث باللغة العربية، وتحديد درجة التشابه أو أصالة الأعمال البحثية وحماية ملكيتها الفكرية. تعرف اكثر