Elliptical curve cryptography-kerberos authentication model for keystone in open stack
dc.contributor.author | Shamugam, V. | |
dc.contributor.author | Murray, Iain | |
dc.contributor.author | Sidhu, Amandeep | |
dc.date.accessioned | 2017-11-20T08:49:17Z | |
dc.date.available | 2017-11-20T08:49:17Z | |
dc.date.created | 2017-11-20T08:13:32Z | |
dc.date.issued | 2017 | |
dc.identifier.citation | Shamugam, V. and Murray, I. and Sidhu, A. 2017. Elliptical curve cryptography-kerberos authentication model for keystone in open stack, pp. 633-644. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/57855 | |
dc.identifier.doi | 10.1007/978-981-10-6502-6_54 | |
dc.description.abstract |
© Springer Nature Singapore Pte Ltd. 2017. Cloud computing is a fastly developing technology, which will be a ubiquitous service in coming days. Cloud has additionally focalized numerous apparently unique components, for example, storage, compute, and so forth into a unified infrastructure. OpenStack is one of the eminent cloud computing programming in the cloud group. It is conveyed as Infrastructure as a Service, which implies and permits the clients to provision their own machines in cloud by utilizing its components, similar to computation, storage, and so on. Keeping in mind about the end goal to give such services, whereas OpenStack needs to verify its clients. The component in OpenStack that plays out this capacity is called Keystone. In Keystone, the present component has to give a token to the requesting clients, which is then given to different services from where the clients ask for particular services (e.g. storage, compute and so forth). In this paper, ECC-Kerberos based authentication model is examined and formulated for OpenStack. The key distribution of this examination is to increase the comprehension of the possibility of Kerberos in OpenStack with the end goal of authentication. A noteworthy advantage is that the authentication model in OpenStack can then be founded as an outstanding and very much high in standard. This proposed authentication model is implemented. The evaluation and demonstration of this implementation is also presented. | |
dc.title | Elliptical curve cryptography-kerberos authentication model for keystone in open stack | |
dc.type | Conference Paper | |
dcterms.source.volume | 752 | |
dcterms.source.startPage | 633 | |
dcterms.source.endPage | 644 | |
dcterms.source.title | Communications in Computer and Information Science | |
dcterms.source.series | Communications in Computer and Information Science | |
dcterms.source.isbn | 9789811065019 | |
curtin.department | Department of Electrical and Computer Engineering | |
curtin.accessStatus | Fulltext not available |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |