Addressing the Security Issues of Kerberos Method using RAID Level 5

Mousumi Hasan Mukti, Sabina Zaman, Khalil Ahammad, Chowdhury Shahriar Muzammel
2018 European Journal of Engineering Research and Science  
Cloud computing is being considered as a revolutionary technique in the field of enterprise hardware and software design and development. As the popularity of cloud computing is increasing day by day and it's the mostly used technique in the online and automated business system, so the security of the stored data in the cloud and the accessing method of the data through the network must be ensured. Among the various types of server and network authentication protocol Kerberos is the latest and
more » ... obust network protocol. For authentication, Kerberos is badly in need of a hosted server which has to be remaining running 24*7 and the access point should be a single server (centralized authentication service). Besides these, if the single server gets down, there is possibility of more attack as Kerberos can't function its job. These are the major hindrance of Kerberos. This research paper has tried to overcome these security issues, accessing and recovering data by using the RAID level. RAID 5 is the most appropriate technique to recover from failure and in correcting the erroneous data by minimizing redundancy as well as mitigating data loss. Also, RAID 5 can be used in case of distributed data. So, a model has been proposed to configure RAID 5 to ensure better security of cloud storage by overcoming the limitations of Kerberos.
doi:10.24018/ejers.2018.3.7.832 fatcat:uu6pseb76jbfdeovn5eoz2b67u