Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of DSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Otoo, Robert Amo"

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • Loading...
    Thumbnail Image
    Item
    Two-factor authentication in cloud computing: using kerberos with one-time password via sms
    (2014-07-13) Otoo, Robert Amo
    Cloud computing is an emerging style of IT delivery that intends to make the Internet the ultimate home of all computing resources- storage, computations, and accessibility. It holds the promise of helping organizations because of its performance, high availability, least cost and many others. But the promise of the cloud cannot be fulfilled until IT professionals have more confidence in the security and safety of the cloud. However cloud computing has the security issues such as service availability, massive traffic handling, application security and authentication. In this, user authentication requires high guaranteed security. To ensure secure authentication of client in the cloud environment, an effective method is being proposed. This paper mainly focused on authentication issues in the cloud computing environment, where an enhancement is made to the intrusion login by Kerberos authentication service having One-Time Password via SMS as an added security base. First, the model of the proposed services is described. Through this model all system entities that are necessary for managing and providing those authentication services are defined. Then, the design and specification of each service is described and explained. These services are based on existing and standardized security mechanisms and frameworks. As a demonstration, a prototype java codes of an authentication service is developed and tested based on the designed authentication solution. It is shown that the model is feasible to secure against potential security risks associated with replay attacks, message information disclosure, message tampering, repudiation and impersonation. Keywords: cloud computing, Kerberos, authentication

Kwame Nkrumah University of Science and Technology copyright © 2002-2025