Analysis and implementation of Kerberos protocol in hybrid cloud computing environments

المؤلف

Khalil, Turkan Ahmad

المصدر

Engineering and Technology Journal

العدد

المجلد 39، العدد 1B (31 يناير/كانون الثاني 2021)، ص ص. 41-52، 12ص.

الناشر

الجامعة التكنولوجية

تاريخ النشر

2021-01-31

دولة النشر

العراق

عدد الصفحات

12

التخصصات الرئيسية

تكنولوجيا المعلومات وعلم الحاسوب

الموضوعات

الملخص EN

The concept of cloud computing has recently changed how hardware, software, and information are handled.

However, security challenges andcredibility requirements have never changed and may have increased.

Protecting cloud computing and providing security for its resources andusers is one of the critical challenges.

As a result, most users are afraid touse their resources, because many security problems must be met.

Forexample, authentication and reliability are major security constraints andmust be provided in a cloud computing environment.

There is a wide rangeof authentication protocols in use, but the researcher has recommendedthe Kerberos protocol to represent and test it in a complex environmentsuch as a mixed cloud environment.

A model has been developed to implement Kerberos authentication in ahybrid cloud computing environment to securely access the cloudcomputing services provided.

This model is represented using the OPNETModeler 14.5 simulation system.

The network efficiency was measuredbefore and after the hacker.

Findings presented in this research aresupporting the ability of the Kerberos protocol to prevent illegal access tocloud computing services, whether from within the private cloud or thepublic cloud.

While maintaining the efficient performance of the The concept of cloud computing has recently changed how hardware, software, and information are handled.

However, security challenges andcredibility requirements have never changed and may have increased.

Protecting cloud computing and providing security for its resources andusers is one of the critical challenges.

As a result, most users are afraid touse their resources, because many security problems must be met.

Forexample, authentication and reliability are major security constraints andmust be provided in a cloud computing environment.

There is a wide rangeof authentication protocols in use, but the researcher has recommendedthe Kerberos protocol to represent and test it in a complex environmentsuch as a mixed cloud environment.

A model has been developed to implement Kerberos authentication in ahybrid cloud computing environment to securely access the cloudcomputing services provided.

This model is represented using the OPNETModeler 14.5 simulation system.

The network efficiency was measuredbefore and after the hacker.

Findings presented in this research aresupporting the ability of the Kerberos protocol to prevent illegal access tocloud computing services, whether from within the private cloud or thepublic cloud.

While maintaining the efficient performance of the network

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

Khalil, Turkan Ahmad. 2021. Analysis and implementation of Kerberos protocol in hybrid cloud computing environments. Engineering and Technology Journal،Vol. 39, no. 1B, pp.41-52.
https://search.emarefa.net/detail/BIM-1282614

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

Khalil, Turkan Ahmad. Analysis and implementation of Kerberos protocol in hybrid cloud computing environments. Engineering and Technology Journal Vol. 39, no. 1B (2021), pp.41-52.
https://search.emarefa.net/detail/BIM-1282614

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

Khalil, Turkan Ahmad. Analysis and implementation of Kerberos protocol in hybrid cloud computing environments. Engineering and Technology Journal. 2021. Vol. 39, no. 1B, pp.41-52.
https://search.emarefa.net/detail/BIM-1282614

نوع البيانات

مقالات

لغة النص

الإنجليزية

الملاحظات

Includes bibliographical references : p. 51-52

رقم السجل

BIM-1282614