Analysis and implementation of Kerberos protocol in hybrid cloud computing environments

Author

Khalil, Turkan Ahmad

Source

Engineering and Technology Journal

Issue

Vol. 39, Issue 1B (31 Jan. 2021), pp.41-52, 12 p.

Publisher

University of Technology

Publication Date

2021-01-31

Country of Publication

Iraq

No. of Pages

12

Main Subjects

Information Technology and Computer Science

Topics

Abstract EN

The concept of cloud computing has recently changed how hardware, software, and information are handled.

However, security challenges andcredibility requirements have never changed and may have increased.

Protecting cloud computing and providing security for its resources andusers is one of the critical challenges.

As a result, most users are afraid touse their resources, because many security problems must be met.

Forexample, authentication and reliability are major security constraints andmust be provided in a cloud computing environment.

There is a wide rangeof authentication protocols in use, but the researcher has recommendedthe Kerberos protocol to represent and test it in a complex environmentsuch as a mixed cloud environment.

A model has been developed to implement Kerberos authentication in ahybrid cloud computing environment to securely access the cloudcomputing services provided.

This model is represented using the OPNETModeler 14.5 simulation system.

The network efficiency was measuredbefore and after the hacker.

Findings presented in this research aresupporting the ability of the Kerberos protocol to prevent illegal access tocloud computing services, whether from within the private cloud or thepublic cloud.

While maintaining the efficient performance of the The concept of cloud computing has recently changed how hardware, software, and information are handled.

However, security challenges andcredibility requirements have never changed and may have increased.

Protecting cloud computing and providing security for its resources andusers is one of the critical challenges.

As a result, most users are afraid touse their resources, because many security problems must be met.

Forexample, authentication and reliability are major security constraints andmust be provided in a cloud computing environment.

There is a wide rangeof authentication protocols in use, but the researcher has recommendedthe Kerberos protocol to represent and test it in a complex environmentsuch as a mixed cloud environment.

A model has been developed to implement Kerberos authentication in ahybrid cloud computing environment to securely access the cloudcomputing services provided.

This model is represented using the OPNETModeler 14.5 simulation system.

The network efficiency was measuredbefore and after the hacker.

Findings presented in this research aresupporting the ability of the Kerberos protocol to prevent illegal access tocloud computing services, whether from within the private cloud or thepublic cloud.

While maintaining the efficient performance of the network

American Psychological Association (APA)

Khalil, Turkan Ahmad. 2021. Analysis and implementation of Kerberos protocol in hybrid cloud computing environments. Engineering and Technology Journal،Vol. 39, no. 1B, pp.41-52.
https://search.emarefa.net/detail/BIM-1282614

Modern Language Association (MLA)

Khalil, Turkan Ahmad. Analysis and implementation of Kerberos protocol in hybrid cloud computing environments. Engineering and Technology Journal Vol. 39, no. 1B (2021), pp.41-52.
https://search.emarefa.net/detail/BIM-1282614

American Medical Association (AMA)

Khalil, Turkan Ahmad. Analysis and implementation of Kerberos protocol in hybrid cloud computing environments. Engineering and Technology Journal. 2021. Vol. 39, no. 1B, pp.41-52.
https://search.emarefa.net/detail/BIM-1282614

Data Type

Journal Articles

Language

English

Notes

Includes bibliographical references : p. 51-52

Record ID

BIM-1282614