Visible to the public An Integrated Model To Make Cloud Authentication And Multi-Tenancy More Secure

TitleAn Integrated Model To Make Cloud Authentication And Multi-Tenancy More Secure
Publication TypeConference Paper
Year of Publication2019
AuthorsDey, H., Islam, R., Arif, H.
Conference Name2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST)
ISBN Number978-1-5386-8014-8
Keywordsauthentication, authentication security, cloud, Cloud Authentication, cloud computing, Cloud Security, computer network security, control database, cryptographic protocols, cryptography, Databases, ECC, Elliptic curve cryptography, encryption method, Human Behavior, integrated model, Kerberos, Kerberos authentication protocol, message authentication, Metrics, multi-access systems, multi-tenancy, multitenancy, Protocols, pubcrawl, public key cryptography, Resiliency, resource allocation, resource allocation manager unit, resource allocation map, Resource management, security protocols

Cloud Computing is an important term of modern technology. The usefulness of Cloud is increasing day by day and simultaneously more and more security problems are arising as well. Two of the major threats of Cloud are improper authentication and multi-tenancy. According to the specialists both pros and cons belong to multi-tenancy. There are security protocols available but it is difficult to claim these protocols are perfect and ensure complete protection. The purpose of this paper is to propose an integrated model to ensure better Cloud security for Authentication and multi-tenancy. Multi-tenancy means sharing of resources and virtualization among clients. Since multi-tenancy allows multiple users to access same resources simultaneously, there is high probability of accessing confidential data without proper privileges. Our model includes Kerberos authentication protocol to enhance authentication security. During our research on Kerberos we have found some flaws in terms of encryption method which have been mentioned in couple of IEEE conference papers. Pondering about this complication we have elected Elliptic Curve Cryptography. On the other hand, to attenuate arose risks due to multi-tenancy we are proposing a Resource Allocation Manager Unit, a Control Database and Resource Allocation Map. This part of the model will perpetuate resource allocation for the users.

Citation Keydey_integrated_2019