Author:
Du Puyuan,Yan Xinlong,Feng Peiyao
Abstract
A plethora of cloud service companies have sprung up in response to the growing amount of data. Data security protection solutions have been proposed by service providers. As a result, a rising number of people are using the cloud to store their own data. However, as technology advances and hackers' capabilities increase, service providers' protection mechanisms become less effective, and data security cannot be guaranteed. We review the logic of the Kerberos algorithm and discuss the work of each part in this paper. This document also includes and discusses difficulties with Kerberos, as well as improvement strategies.The main focus will be on strengthening the security of the Kerberos secure communication process, which will serve as a reference for Kerberos security transmission and authentication research. It solves the problem of the symmetric encryption algorithm's relatively low security in the authentication process by replacing it with the RSA one-time encryption algorithm; in addition, the Kerberos authentication protocol is added between the client and the cloud service provider to secure the data transmission process. Furthermore, this paper explains some basic authentication principles.
Publisher
Darcy & Roy Press Co. Ltd.
Reference15 articles.
1. Bhatia, A., Xiong, C., Zhang, F., Kumar, N., & Cai, Y. (2019). U.S. Patent No. 10,403,372. Washington, DC: U.S. Patent and Trademark Office.
2. Neuman, B. C., & Ts'o, T. (1994). Kerberos: An authentication service for computer networks. IEEE Communications magazine, 32(9), 33-38.
3. Malar, M. B. A., & Prabhu, J. (2020). Trust based authentication scheme (tbas) for cloud computing environment with Kerberos protocol using distributed controller and prevention attack. International Journal of Pervasive Computing and Communications.
4. Saltzer, J. H. (2021). On the Origin of Kerberos. IEEE Annals of the History of Computing, 43(1), 89-91.
5. Anita Narwal and Sunita Tomar. (2015). Kerberos Protocol: A Review. International Journal of Engineering Research and, V4(04).