Analysis and implementation of Kerberos protocol in hybrid cloud computing environments
Author
Source
Engineering and Technology Journal
Issue
Vol. 39, Issue 1B (31 Jan. 2021), pp.41-52, 12 p.
Publisher
Publication Date
2021-01-31
Country of Publication
Iraq
No. of Pages
12
Main Subjects
Information Technology and Computer Science
Topics
Abstract EN
The concept of cloud computing has recently changed how hardware, software, and information are handled.
However, security challenges andcredibility requirements have never changed and may have increased.
Protecting cloud computing and providing security for its resources andusers is one of the critical challenges.
As a result, most users are afraid touse their resources, because many security problems must be met.
Forexample, authentication and reliability are major security constraints andmust be provided in a cloud computing environment.
There is a wide rangeof authentication protocols in use, but the researcher has recommendedthe Kerberos protocol to represent and test it in a complex environmentsuch as a mixed cloud environment.
A model has been developed to implement Kerberos authentication in ahybrid cloud computing environment to securely access the cloudcomputing services provided.
This model is represented using the OPNETModeler 14.5 simulation system.
The network efficiency was measuredbefore and after the hacker.
Findings presented in this research aresupporting the ability of the Kerberos protocol to prevent illegal access tocloud computing services, whether from within the private cloud or thepublic cloud.
While maintaining the efficient performance of the The concept of cloud computing has recently changed how hardware, software, and information are handled.
However, security challenges andcredibility requirements have never changed and may have increased.
Protecting cloud computing and providing security for its resources andusers is one of the critical challenges.
As a result, most users are afraid touse their resources, because many security problems must be met.
Forexample, authentication and reliability are major security constraints andmust be provided in a cloud computing environment.
There is a wide rangeof authentication protocols in use, but the researcher has recommendedthe Kerberos protocol to represent and test it in a complex environmentsuch as a mixed cloud environment.
A model has been developed to implement Kerberos authentication in ahybrid cloud computing environment to securely access the cloudcomputing services provided.
This model is represented using the OPNETModeler 14.5 simulation system.
The network efficiency was measuredbefore and after the hacker.
Findings presented in this research aresupporting the ability of the Kerberos protocol to prevent illegal access tocloud computing services, whether from within the private cloud or thepublic cloud.
While maintaining the efficient performance of the network
American Psychological Association (APA)
Khalil, Turkan Ahmad. 2021. Analysis and implementation of Kerberos protocol in hybrid cloud computing environments. Engineering and Technology Journal،Vol. 39, no. 1B, pp.41-52.
https://search.emarefa.net/detail/BIM-1282614
Modern Language Association (MLA)
Khalil, Turkan Ahmad. Analysis and implementation of Kerberos protocol in hybrid cloud computing environments. Engineering and Technology Journal Vol. 39, no. 1B (2021), pp.41-52.
https://search.emarefa.net/detail/BIM-1282614
American Medical Association (AMA)
Khalil, Turkan Ahmad. Analysis and implementation of Kerberos protocol in hybrid cloud computing environments. Engineering and Technology Journal. 2021. Vol. 39, no. 1B, pp.41-52.
https://search.emarefa.net/detail/BIM-1282614
Data Type
Journal Articles
Language
English
Notes
Includes bibliographical references : p. 51-52
Record ID
BIM-1282614