An Integrated Model To Make Cloud Authentication And Multi-Tenancy More Secure
Title | An Integrated Model To Make Cloud Authentication And Multi-Tenancy More Secure |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Dey, H., Islam, R., Arif, H. |
Conference Name | 2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST) |
ISBN Number | 978-1-5386-8014-8 |
Keywords | authentication, authentication security, cloud, Cloud Authentication, cloud computing, Cloud Security, computer network security, control database, cryptographic protocols, cryptography, Databases, ECC, Elliptic curve cryptography, encryption method, Human Behavior, integrated model, Kerberos, Kerberos authentication protocol, message authentication, Metrics, multi-access systems, multi-tenancy, multitenancy, Protocols, pubcrawl, public key cryptography, Resiliency, resource allocation, resource allocation manager unit, resource allocation map, Resource management, security protocols |
Abstract | Cloud Computing is an important term of modern technology. The usefulness of Cloud is increasing day by day and simultaneously more and more security problems are arising as well. Two of the major threats of Cloud are improper authentication and multi-tenancy. According to the specialists both pros and cons belong to multi-tenancy. There are security protocols available but it is difficult to claim these protocols are perfect and ensure complete protection. The purpose of this paper is to propose an integrated model to ensure better Cloud security for Authentication and multi-tenancy. Multi-tenancy means sharing of resources and virtualization among clients. Since multi-tenancy allows multiple users to access same resources simultaneously, there is high probability of accessing confidential data without proper privileges. Our model includes Kerberos authentication protocol to enhance authentication security. During our research on Kerberos we have found some flaws in terms of encryption method which have been mentioned in couple of IEEE conference papers. Pondering about this complication we have elected Elliptic Curve Cryptography. On the other hand, to attenuate arose risks due to multi-tenancy we are proposing a Resource Allocation Manager Unit, a Control Database and Resource Allocation Map. This part of the model will perpetuate resource allocation for the users. |
URL | https://ieeexplore.ieee.org/document/8644077 |
DOI | 10.1109/ICREST.2019.8644077 |
Citation Key | dey_integrated_2019 |
- Kerberos
- security protocols
- resource management
- resource allocation map
- resource allocation manager unit
- resource allocation
- Resiliency
- public key cryptography
- pubcrawl
- Protocols
- multitenancy
- multi-tenancy
- multi-access systems
- Metrics
- message authentication
- Kerberos authentication protocol
- Cryptography
- integrated model
- Human behavior
- encryption method
- Elliptic curve cryptography
- ECC
- Databases
- Cryptographic Protocols
- control database
- computer network security
- Cloud Security
- Cloud Computing
- Cloud Authentication
- cloud
- authentication security
- authentication