Authentication and authorization in cloud computing using kerberos

The emergence of cloud computing paradigm offers attractive and innovative computing services. Cloud providers deliver various types of computing services to customers according to a pay-per-use economic model. However, this technology introduces a new concern for enterprises and businesses regardin...

Full description

Saved in:
Bibliographic Details
Main Author: Hidar, Ahmad M. Saeed
Format: Thesis
Language:English
Published: 2014
Subjects:
Online Access:http://eprints.utm.my/id/eprint/41594/5/AhmadMSaeedHidarMFSKSM2014.pdf
http://eprints.utm.my/id/eprint/41594/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.41594
record_format eprints
spelling my.utm.415942017-09-08T06:14:29Z http://eprints.utm.my/id/eprint/41594/ Authentication and authorization in cloud computing using kerberos Hidar, Ahmad M. Saeed QA76 Computer software The emergence of cloud computing paradigm offers attractive and innovative computing services. Cloud providers deliver various types of computing services to customers according to a pay-per-use economic model. However, this technology introduces a new concern for enterprises and businesses regarding their privacy and security. Security as a Service is a new cloud service model for the security enhancement of a cloud environment. This is a way of centralizing security solutions under the control of professional security specialists. Authentication and authorization services are parts of cloud security services. This study focused on Authentication and authorization solutions for cloud environments. More specifically, architecture of a cloud security system is designed and proposed for providing two identity services for cloud-based systems: authentication and authorization. The main contribution of this study is to implement these services using Kerberos protocol, which will enable cloud-based application service providers to manage their users in an open, flexible, interoperable and secure environment. The methods of the proposed services are necessary for managing and providing those identity services. The implementation and specification of each service is described and explained, a prototype system of an authentication and authorization services are implemented and tested. The implementation is done using Web Service technology; it is shown that both services are at least computationally secure against potential security risks associated with different types of attacks. The security of Kerberos protocol that has been implemented for authentication ensures a secure and reliable environment for cloud-based application services, which is very easy to deploy and exploit on cloud-based platforms. 2014-01 Thesis NonPeerReviewed application/pdf en http://eprints.utm.my/id/eprint/41594/5/AhmadMSaeedHidarMFSKSM2014.pdf Hidar, Ahmad M. Saeed (2014) Authentication and authorization in cloud computing using kerberos. Masters thesis, Universiti Teknologi Malaysia, Faculty of Computing.
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic QA76 Computer software
spellingShingle QA76 Computer software
Hidar, Ahmad M. Saeed
Authentication and authorization in cloud computing using kerberos
description The emergence of cloud computing paradigm offers attractive and innovative computing services. Cloud providers deliver various types of computing services to customers according to a pay-per-use economic model. However, this technology introduces a new concern for enterprises and businesses regarding their privacy and security. Security as a Service is a new cloud service model for the security enhancement of a cloud environment. This is a way of centralizing security solutions under the control of professional security specialists. Authentication and authorization services are parts of cloud security services. This study focused on Authentication and authorization solutions for cloud environments. More specifically, architecture of a cloud security system is designed and proposed for providing two identity services for cloud-based systems: authentication and authorization. The main contribution of this study is to implement these services using Kerberos protocol, which will enable cloud-based application service providers to manage their users in an open, flexible, interoperable and secure environment. The methods of the proposed services are necessary for managing and providing those identity services. The implementation and specification of each service is described and explained, a prototype system of an authentication and authorization services are implemented and tested. The implementation is done using Web Service technology; it is shown that both services are at least computationally secure against potential security risks associated with different types of attacks. The security of Kerberos protocol that has been implemented for authentication ensures a secure and reliable environment for cloud-based application services, which is very easy to deploy and exploit on cloud-based platforms.
format Thesis
author Hidar, Ahmad M. Saeed
author_facet Hidar, Ahmad M. Saeed
author_sort Hidar, Ahmad M. Saeed
title Authentication and authorization in cloud computing using kerberos
title_short Authentication and authorization in cloud computing using kerberos
title_full Authentication and authorization in cloud computing using kerberos
title_fullStr Authentication and authorization in cloud computing using kerberos
title_full_unstemmed Authentication and authorization in cloud computing using kerberos
title_sort authentication and authorization in cloud computing using kerberos
publishDate 2014
url http://eprints.utm.my/id/eprint/41594/5/AhmadMSaeedHidarMFSKSM2014.pdf
http://eprints.utm.my/id/eprint/41594/
_version_ 1643650662580355072
score 13.159267