Visible to the public A New Version of Kerberos Authentication Protocol Using ECC and Threshold Cryptography for Cloud Security

TitleA New Version of Kerberos Authentication Protocol Using ECC and Threshold Cryptography for Cloud Security
Publication TypeConference Paper
Year of Publication2018
AuthorsSutradhar, M. R., Sultana, N., Dey, H., Arif, H.
Conference Name2018 Joint 7th International Conference on Informatics, Electronics Vision (ICIEV) and 2018 2nd International Conference on Imaging, Vision Pattern Recognition (icIVPR)
Keywordsauthentication, cloud computing, Cloud Security, cryptographic protocols, ECC, Elliptic curve cryptography, high security, Human Behavior, Kerberos, Kerberos authentication protocol, Metrics, protocol, protocol models, Protocols, pubcrawl, public key cryptography, Resiliency, RSA, RSA cryptography, securities issues, security of data, security protocols, Servers, telecommunication security, threshold, threshold cryptography
Abstract

Dependency on cloud computing are increasing day by day due to its beneficial aspects. As day by day we are relying on cloud computing, the securities issues are coming up. There are lots of security protocols but now-a-days those protocol are not secured enough to provide a high security. One of those protocols which were once highly secured, is Kerberos authentication protocol. With the advancement of technology, Kerberos authentication protocol is no longer as secured as it was before. Many authors have thought about the improvement of Kerberos authentication protocol and consequently they have proposed different types of protocol models by using a renowned public key cryptography named RSA cryptography. Though RSA cryptography is good to some extent but this cryptography has some flaws that make this cryptography less secured as well as less efficient. In this paper, we are combining Elliptic Curve Cryptography (ECC) as well as Threshold Cryptography to create a new version of Kerberos authentication protocol. Our proposed model will provide secure transaction of data which will not only be hard to break but also increase memory efficiency, cost efficiency, and reduce the burden of computation.

URLhttps://ieeexplore.ieee.org/document/8641010
DOI10.1109/ICIEV.2018.8641010
Citation Keysutradhar_new_2018