Trust based authentication scheme (tbas) for cloud computing environment with Kerberos protocol using distributed controller and prevention attack.
Benjula Anbu Malar M. B.Prabhu JayagopalPublished in: Int. J. Pervasive Comput. Commun. (2021)
Keyphrases
- authentication protocol
- authentication scheme
- cloud computing environment
- secret key
- cloud computing
- smart card
- mutual authentication
- lightweight
- user authentication
- key distribution
- load balancing
- virtual machine
- security analysis
- public key
- load balance
- security protocols
- distributed computing
- cryptographic protocols
- open architecture
- computing environments
- diffie hellman
- key agreement
- rfid tags
- hash functions
- computing platform
- distributed systems
- computing resources
- distributed environment
- service providers
- operating system
- data management
- trusted third party
- signature scheme
- digital signature
- digital libraries
- information systems