Show simple item record

dc.contributor.authorShamugam, V.
dc.contributor.authorMurray, Iain
dc.contributor.authorSidhu, Amandeep
dc.date.accessioned2017-11-20T08:49:17Z
dc.date.available2017-11-20T08:49:17Z
dc.date.created2017-11-20T08:13:32Z
dc.date.issued2017
dc.identifier.citationShamugam, V. and Murray, I. and Sidhu, A. 2017. Elliptical curve cryptography-kerberos authentication model for keystone in open stack, pp. 633-644.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/57855
dc.identifier.doi10.1007/978-981-10-6502-6_54
dc.description.abstract

© Springer Nature Singapore Pte Ltd. 2017. Cloud computing is a fastly developing technology, which will be a ubiquitous service in coming days. Cloud has additionally focalized numerous apparently unique components, for example, storage, compute, and so forth into a unified infrastructure. OpenStack is one of the eminent cloud computing programming in the cloud group. It is conveyed as Infrastructure as a Service, which implies and permits the clients to provision their own machines in cloud by utilizing its components, similar to computation, storage, and so on. Keeping in mind about the end goal to give such services, whereas OpenStack needs to verify its clients. The component in OpenStack that plays out this capacity is called Keystone. In Keystone, the present component has to give a token to the requesting clients, which is then given to different services from where the clients ask for particular services (e.g. storage, compute and so forth). In this paper, ECC-Kerberos based authentication model is examined and formulated for OpenStack. The key distribution of this examination is to increase the comprehension of the possibility of Kerberos in OpenStack with the end goal of authentication. A noteworthy advantage is that the authentication model in OpenStack can then be founded as an outstanding and very much high in standard. This proposed authentication model is implemented. The evaluation and demonstration of this implementation is also presented.

dc.titleElliptical curve cryptography-kerberos authentication model for keystone in open stack
dc.typeConference Paper
dcterms.source.volume752
dcterms.source.startPage633
dcterms.source.endPage644
dcterms.source.titleCommunications in Computer and Information Science
dcterms.source.seriesCommunications in Computer and Information Science
dcterms.source.isbn9789811065019
curtin.departmentDepartment of Electrical and Computer Engineering
curtin.accessStatusFulltext not available


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record