Elliptical curve cryptography-kerberos authentication model for keystone in open stack

© Springer Nature Singapore Pte Ltd. 2017. Cloud computing is a fastly developing technology, which will be a ubiquitous service in coming days. Cloud has additionally focalized numerous apparently unique components, for example, storage, compute, and so forth into a unified infrastructure. OpenStac...

Full description

Bibliographic Details
Main Authors: Shamugam, V., Murray, Iain, Sidhu, Amandeep
Format: Conference Paper
Published: 2017
Online Access:http://hdl.handle.net/20.500.11937/57855
_version_ 1848760115370393600
author Shamugam, V.
Murray, Iain
Sidhu, Amandeep
author_facet Shamugam, V.
Murray, Iain
Sidhu, Amandeep
author_sort Shamugam, V.
building Curtin Institutional Repository
collection Online Access
description © Springer Nature Singapore Pte Ltd. 2017. Cloud computing is a fastly developing technology, which will be a ubiquitous service in coming days. Cloud has additionally focalized numerous apparently unique components, for example, storage, compute, and so forth into a unified infrastructure. OpenStack is one of the eminent cloud computing programming in the cloud group. It is conveyed as Infrastructure as a Service, which implies and permits the clients to provision their own machines in cloud by utilizing its components, similar to computation, storage, and so on. Keeping in mind about the end goal to give such services, whereas OpenStack needs to verify its clients. The component in OpenStack that plays out this capacity is called Keystone. In Keystone, the present component has to give a token to the requesting clients, which is then given to different services from where the clients ask for particular services (e.g. storage, compute and so forth). In this paper, ECC-Kerberos based authentication model is examined and formulated for OpenStack. The key distribution of this examination is to increase the comprehension of the possibility of Kerberos in OpenStack with the end goal of authentication. A noteworthy advantage is that the authentication model in OpenStack can then be founded as an outstanding and very much high in standard. This proposed authentication model is implemented. The evaluation and demonstration of this implementation is also presented.
first_indexed 2025-11-14T10:10:39Z
format Conference Paper
id curtin-20.500.11937-57855
institution Curtin University Malaysia
institution_category Local University
last_indexed 2025-11-14T10:10:39Z
publishDate 2017
recordtype eprints
repository_type Digital Repository
spelling curtin-20.500.11937-578552017-11-20T08:58:03Z Elliptical curve cryptography-kerberos authentication model for keystone in open stack Shamugam, V. Murray, Iain Sidhu, Amandeep © Springer Nature Singapore Pte Ltd. 2017. Cloud computing is a fastly developing technology, which will be a ubiquitous service in coming days. Cloud has additionally focalized numerous apparently unique components, for example, storage, compute, and so forth into a unified infrastructure. OpenStack is one of the eminent cloud computing programming in the cloud group. It is conveyed as Infrastructure as a Service, which implies and permits the clients to provision their own machines in cloud by utilizing its components, similar to computation, storage, and so on. Keeping in mind about the end goal to give such services, whereas OpenStack needs to verify its clients. The component in OpenStack that plays out this capacity is called Keystone. In Keystone, the present component has to give a token to the requesting clients, which is then given to different services from where the clients ask for particular services (e.g. storage, compute and so forth). In this paper, ECC-Kerberos based authentication model is examined and formulated for OpenStack. The key distribution of this examination is to increase the comprehension of the possibility of Kerberos in OpenStack with the end goal of authentication. A noteworthy advantage is that the authentication model in OpenStack can then be founded as an outstanding and very much high in standard. This proposed authentication model is implemented. The evaluation and demonstration of this implementation is also presented. 2017 Conference Paper http://hdl.handle.net/20.500.11937/57855 10.1007/978-981-10-6502-6_54 restricted
spellingShingle Shamugam, V.
Murray, Iain
Sidhu, Amandeep
Elliptical curve cryptography-kerberos authentication model for keystone in open stack
title Elliptical curve cryptography-kerberos authentication model for keystone in open stack
title_full Elliptical curve cryptography-kerberos authentication model for keystone in open stack
title_fullStr Elliptical curve cryptography-kerberos authentication model for keystone in open stack
title_full_unstemmed Elliptical curve cryptography-kerberos authentication model for keystone in open stack
title_short Elliptical curve cryptography-kerberos authentication model for keystone in open stack
title_sort elliptical curve cryptography-kerberos authentication model for keystone in open stack
url http://hdl.handle.net/20.500.11937/57855