Elliptical curve cryptography-kerberos authentication model for keystone in open stack
MetadataShow full item record
© Springer Nature Singapore Pte Ltd. 2017. Cloud computing is a fastly developing technology, which will be a ubiquitous service in coming days. Cloud has additionally focalized numerous apparently unique components, for example, storage, compute, and so forth into a unified infrastructure. OpenStack is one of the eminent cloud computing programming in the cloud group. It is conveyed as Infrastructure as a Service, which implies and permits the clients to provision their own machines in cloud by utilizing its components, similar to computation, storage, and so on. Keeping in mind about the end goal to give such services, whereas OpenStack needs to verify its clients. The component in OpenStack that plays out this capacity is called Keystone. In Keystone, the present component has to give a token to the requesting clients, which is then given to different services from where the clients ask for particular services (e.g. storage, compute and so forth). In this paper, ECC-Kerberos based authentication model is examined and formulated for OpenStack. The key distribution of this examination is to increase the comprehension of the possibility of Kerberos in OpenStack with the end goal of authentication. A noteworthy advantage is that the authentication model in OpenStack can then be founded as an outstanding and very much high in standard. This proposed authentication model is implemented. The evaluation and demonstration of this implementation is also presented.
Showing items related by title, author, creator and subject.
Alhamad, Mohammed (2011)Cloud computing has changed the strategy used for providing distributed services to many business and government agents. Cloud computing delivers scalable and on-demand services to most users in different domains. However, ...
Pichan, A.; Lazarescu, Mihai; Soh, Sie Teng (2018)© 2018 Elsevier Ltd This paper exposes and explore the practical issues with the usability of log artefacts for digital forensics in cloud computing. Logs, providing detailed events of actions on a time scale have been a ...
Trust and reputation for service-oriented environments: Technologies for building business intelligence and consumer confidenceChang, Elizabeth; Dillon, Tharam S.; Hussain, Farookh (2006)Trust has played a central role in human relationships and hence has been the subject of study in many fields including business, law, social science, philosophy and psychology. It has played a pivotal role in forming ...