Elliptical curve cryptography-kerberos authentication model for keystone in open stack
© Springer Nature Singapore Pte Ltd. 2017. Cloud computing is a fastly developing technology, which will be a ubiquitous service in coming days. Cloud has additionally focalized numerous apparently unique components, for example, storage, compute, and so forth into a unified infrastructure. OpenStac...
| Main Authors: | , , |
|---|---|
| Format: | Conference Paper |
| Published: |
2017
|
| Online Access: | http://hdl.handle.net/20.500.11937/57855 |
| _version_ | 1848760115370393600 |
|---|---|
| author | Shamugam, V. Murray, Iain Sidhu, Amandeep |
| author_facet | Shamugam, V. Murray, Iain Sidhu, Amandeep |
| author_sort | Shamugam, V. |
| building | Curtin Institutional Repository |
| collection | Online Access |
| description | © Springer Nature Singapore Pte Ltd. 2017. Cloud computing is a fastly developing technology, which will be a ubiquitous service in coming days. Cloud has additionally focalized numerous apparently unique components, for example, storage, compute, and so forth into a unified infrastructure. OpenStack is one of the eminent cloud computing programming in the cloud group. It is conveyed as Infrastructure as a Service, which implies and permits the clients to provision their own machines in cloud by utilizing its components, similar to computation, storage, and so on. Keeping in mind about the end goal to give such services, whereas OpenStack needs to verify its clients. The component in OpenStack that plays out this capacity is called Keystone. In Keystone, the present component has to give a token to the requesting clients, which is then given to different services from where the clients ask for particular services (e.g. storage, compute and so forth). In this paper, ECC-Kerberos based authentication model is examined and formulated for OpenStack. The key distribution of this examination is to increase the comprehension of the possibility of Kerberos in OpenStack with the end goal of authentication. A noteworthy advantage is that the authentication model in OpenStack can then be founded as an outstanding and very much high in standard. This proposed authentication model is implemented. The evaluation and demonstration of this implementation is also presented. |
| first_indexed | 2025-11-14T10:10:39Z |
| format | Conference Paper |
| id | curtin-20.500.11937-57855 |
| institution | Curtin University Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-14T10:10:39Z |
| publishDate | 2017 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | curtin-20.500.11937-578552017-11-20T08:58:03Z Elliptical curve cryptography-kerberos authentication model for keystone in open stack Shamugam, V. Murray, Iain Sidhu, Amandeep © Springer Nature Singapore Pte Ltd. 2017. Cloud computing is a fastly developing technology, which will be a ubiquitous service in coming days. Cloud has additionally focalized numerous apparently unique components, for example, storage, compute, and so forth into a unified infrastructure. OpenStack is one of the eminent cloud computing programming in the cloud group. It is conveyed as Infrastructure as a Service, which implies and permits the clients to provision their own machines in cloud by utilizing its components, similar to computation, storage, and so on. Keeping in mind about the end goal to give such services, whereas OpenStack needs to verify its clients. The component in OpenStack that plays out this capacity is called Keystone. In Keystone, the present component has to give a token to the requesting clients, which is then given to different services from where the clients ask for particular services (e.g. storage, compute and so forth). In this paper, ECC-Kerberos based authentication model is examined and formulated for OpenStack. The key distribution of this examination is to increase the comprehension of the possibility of Kerberos in OpenStack with the end goal of authentication. A noteworthy advantage is that the authentication model in OpenStack can then be founded as an outstanding and very much high in standard. This proposed authentication model is implemented. The evaluation and demonstration of this implementation is also presented. 2017 Conference Paper http://hdl.handle.net/20.500.11937/57855 10.1007/978-981-10-6502-6_54 restricted |
| spellingShingle | Shamugam, V. Murray, Iain Sidhu, Amandeep Elliptical curve cryptography-kerberos authentication model for keystone in open stack |
| title | Elliptical curve cryptography-kerberos authentication model for keystone in open stack |
| title_full | Elliptical curve cryptography-kerberos authentication model for keystone in open stack |
| title_fullStr | Elliptical curve cryptography-kerberos authentication model for keystone in open stack |
| title_full_unstemmed | Elliptical curve cryptography-kerberos authentication model for keystone in open stack |
| title_short | Elliptical curve cryptography-kerberos authentication model for keystone in open stack |
| title_sort | elliptical curve cryptography-kerberos authentication model for keystone in open stack |
| url | http://hdl.handle.net/20.500.11937/57855 |