{"title":"CTES based secure approach for authentication and authorization of resource and service in clouds","authors":"S. Pippal, Aruna Kumari, D. S. Kushwaha","doi":"10.1109/ICCCT.2011.6075140","DOIUrl":null,"url":null,"abstract":"Cloud services are generally deployed in dedicated machines within Data-center. A cloud using distributed services and voluntary resources to build up its data center, where storage and computational resources of participating individual machines are harnessed non-intrusively, providing security to resources, services and users are primary objectives. Authentication and authorization are keys to any security mechanism. In this paper, we have made an attempt to address the associated concerns through an authentication and authorization model for a cloud computing paradigm. The paper also describes an improvement over traditional Kerberos protocol to authenticate the users and to access the services and resources in cloud, such that offsets certain limitations of Kerberos.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCT.2011.6075140","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18
Abstract
Cloud services are generally deployed in dedicated machines within Data-center. A cloud using distributed services and voluntary resources to build up its data center, where storage and computational resources of participating individual machines are harnessed non-intrusively, providing security to resources, services and users are primary objectives. Authentication and authorization are keys to any security mechanism. In this paper, we have made an attempt to address the associated concerns through an authentication and authorization model for a cloud computing paradigm. The paper also describes an improvement over traditional Kerberos protocol to authenticate the users and to access the services and resources in cloud, such that offsets certain limitations of Kerberos.