Main Menu

authentication in cloud computing thesis

ResearchGate is the professional network for scientists and researchers. Technical questions like the one you've just found usually get answered within 48 hours on ResearchGate. Sign up today to join our community of over 9 million scientific professionals. Join for free.
1 A Secure Data Transfer Technique for Cloud Computing Thesis submitted in partial fulfillment of the requirements for the award of degree of Master of Engineering in Computer Science and Engineering Submitted By Pankaj Pateriya (Roll No. 801232015) Under the supervision of: Dr. Inderveer Chana Associate Professor COMPUTER SCIENCE AND ENGINEERING DEPARTMENT THAPAR UNIVERSITY PATIALA 147004 August 2014 2 i 3 ACKNOWLEDGEMENT No volume of words is enough to express my gratitude towards my guide Dr. Inderveer Chana, Associate Professor, Computer Science & Engineering Department, for providing her immense help, guidance, simulating suggestions and encouragement all the time. She has helped me to explore this vast topic in an organized manner and provided me all the ideas on how to work towards a research-oriented venture. I am also thankful to Dr. S. K. Mohapatra, Dean of Academic Affairs, Dr. Deepak Garg, Head of Computer Science & Engineering Department and Mr. Ashutosh Mishra, P.G. Coordinator, for the motivation and inspiration that triggered me for the thesis work. I would also like to thank the staff members and my colleagues who were always there at the need of hour and provided with all the help and facilities, which I required, for the completion of my thesis work. I extend my thanks to Dr. Maninder, Associate Professor, Computer Science & Engineering Department and Mr. Sukhpal Singh for sharing their expertise and time to help me accomplish this work. Most importantly, I would like to thank my parents and the almighty for showing me the right direction out of the blue, to help me stay calm in the oddest of the times and keep moving even at times when there was no hope. (Pankaj Pateriya) 801232015 ii 4 ABSTRACT Cloud Computing offers services to end-users rather than a product, by sharing resources, software and other information under a pay per usage model.
Hidar, Ahmad M. Saeed (2014) Authentication and authorization in cloud computing using kerberos. Masters thesis, Universiti Teknologi Malaysia, Faculty of Computing. AbstractThe emergence of cloud computing paradigm offers attractive and innovative computing services. Cloud providers deliver various types of computing services to customers according to a pay-per-use economic model. However, this technology introduces a new concern for enterprises and businesses regarding their privacy and security. Security as a Service is a new cloud service model for the security enhancement of a cloud environment. This is a way of centralizing security solutions under the control of professional security specialists. Authentication and authorization services are parts of cloud security services. This study focused on Authentication and authorization solutions for cloud environments. More specifically, architecture of a cloud security system is designed and proposed for providing two identity services for cloud-based systems: authentication and authorization. The main contribution of this study is to implement these services using Kerberos protocol, which will enable cloud-based application service providers to manage their users in an open, flexible, interoperable and secure environment. The methods of the proposed services are necessary for managing and providing those identity services. The implementation and specification of each service is described and explained, a prototype system of an authentication and authorization services are implemented and tested. The implementation is done using Web Service technology; it is shown that both services are at least computationally secure against potential security risks associated with different types of attacks. The security of Kerberos protocol that has been implemented for authentication ensures a secure and reliable environment for.



« (Previous News)