IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Verifiable Response in Heterogeneous Cloud Storage: An Efficient KDC Scheme

Verifiable Response in Heterogeneous Cloud Storage: An Efficient KDC Scheme
View Sample PDF
Author(s): Abdul Wahid (Maulana Azad National Urdu University, India), Mohatesham Pasha Quadri (Maulana Azad National Urdu University, India), Ahmad Talha Siddiqui (Maulana Azad National Urdu University, India), Mudasir M. Kirmani (Sher-e-Kashmir University of Agricultural Science and Technology of Kashmir, India)and Khaleel Ahmad (Maulana Azad National Urdu University, India)
Copyright: 2015
Pages: 18
Source title: Handbook of Research on Securing Cloud-Based Databases with Biometric Applications
Source Author(s)/Editor(s): Ganesh Chandra Deka (Ministry of Labour and Employment, India)and Sambit Bakshi (National Institute of Technology Rourkela, India)
DOI: 10.4018/978-1-4666-6559-0.ch005

Purchase

View Verifiable Response in Heterogeneous Cloud Storage: An Efficient KDC Scheme on the publisher's website for pricing and purchasing information.

Abstract

A Distributed Cloud Storage Provider (DCSP) is used for managing the client's data. However, the platform is vulnerable to security attacks, which results in huge losses of client data. The confidential data in an enterprise system may be illegally accessed through a remote interface provided by a heterogeneous-cloud and archives. The data may be lost or tampered with when it is stored in a storage pool outside the enterprise on a cloud. To achieve reliability, consistency, security, and confidentiality of user information Kerberos Protocol is used. The Kerberos protocol is designed to provide reliable authentication over open and insecure networks. The symmetric-key cryptography is maintained for transaction over the network. In this chapter, a cooperative Key-Distribution Center (KDC) scheme is proposed to support dynamic scalability on multiple storage servers. The results of the research work show that KDC provides effective security properties required by Kerberos protocol to mitigate the impact of various attacks in any cloud.

Related Content

Dina Darwish. © 2024. 43 pages.
Kassim Kalinaki, Musau Abdullatif, Sempala Abdul-Karim Nasser, Ronald Nsubuga, Julius Kugonza. © 2024. 23 pages.
Yogita Yashveer Raghav, Ramesh Kait. © 2024. 17 pages.
Renuka Devi Saravanan, Shyamala Loganathan, Saraswathi Shunmuganathan. © 2024. 21 pages.
Veera Talukdar, Ardhariksa Zukhruf Kurniullah, Palak Keshwani, Huma Khan, Sabyasachi Pramanik, Ankur Gupta, Digvijay Pandey. © 2024. 30 pages.
Dharmesh Dhabliya, Sukhvinder Singh Dari, Nitin N. Sakhare, Anish Kumar Dhablia, Digvijay Pandey, Balakumar Muniandi, A. Shaji George, A. Shahul Hameed, Pankaj Dadheech. © 2024. 9 pages.
Avtar Singh, Shobhana Kashyap. © 2024. 11 pages.
Body Bottom