Modification on Kerberos Authentication Protocol in Grid Computing Environment

نویسندگان

  • Rong Chen
  • Yadong Gui
  • Ji Gao
چکیده

The Kerberos is applied widely in OS and grid computing environment. The Kerberos system isn’t secure enough for symmetrical encryption. The paper describes a method that transform symmetrical key into asymmetric encryption on the basis of keeping symmetrical key of one side changeless. The algorithm strengthens the security of Kerberos protocol through proofing.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

P-LeaSel for GRID Environment

Multicast services, grid computing and wireless interconnection networks are among the emerging technologies of the last decade. Incorporating security features in multicast communications gives rise to overheads and computational complexities at the server. Designing an efficient model for secure multicast is a challenging area for the researchers. Grid environment in today’s world is a boon f...

متن کامل

An Improved Security and Trusting Model for Computational Grid

Grid Computing in today’s world is a boon for high speed computing. Grids are composed from intersection of clusters, which provide huge volume of computing power. An environment with broadly distributed resources is liable to various types of security attacks. To solve this problem, we use P-LEASEL algorithm, which provides secure multicast communications in grid environment. Kerberos is used ...

متن کامل

A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography

Kerberos is an authentication protocol in which client and server can mutually authenticate to each other across an insecure network connection, to ensure data integrity of the message and privacy of channel communications. In this paper, a new novel is proposed to improve Kerberos authentication protocol by using Secret Image. This proposed modification in Kerberos will be modified to yield be...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

Extensible Pre-Authentication in Kerberos

EXTENSIBLE PRE-AUTHENTICATION IN KERBEROS Phillip Hellewell Department of Computer Science Master of Science Organizations need to provide services to a wide range of people, including strangers outside their local security domain. As the number of users grows larger, it becomes increasingly tedious to maintain and provision user accounts. It remains an open problem to create a system for provi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003