Abstract
Today most data is stored in remote sites that are usually distributed systems. The increase of virus, trojans or ramsomware has led to the implementation of security mechanisms to protect the access to data and guarantee their privacy and integrity. Important security issues to be considered in a computer system are the authentication and access control. Authentication provides proof of identity, while access control limits the actions or operations that a legitimate user of a computer system can perform. However, both authentication and access control are strongly related, because access control assumes that the authentication of the user has been previously successfully verified. Likewise, strong authentication methods requires to integrate cryptography techniques. This paper introduces and evaluates an authentication mechanism to access distributed data in a multi-domains environment. Authentication mechanism based on Kerberos uses encryption of messages and data. Interoperability between domains allows clients and servers that belong to different domains to offer data or services among them for previously authenticated users.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Neumann, B.C., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Commun. Mag. 32(9), 33–38 (1994)
López-Fuentes, F.A.: Sistemas Distribuidos, UAM, Unidad Cuajimalpa, pp. 1–203 (2015)
MIT Kerberos Consortium: The Role of Kerberos in Modern Information Systems, pp. 1–53 (2008)
MIT Kerberos Consortium, Why is Kerberos a credible security solution? pp. 1–13 (2008)
Bishop, M.: Introduction to Computer Security, Pearson Education, Inc. pp. 2–3, 97 (2005)
Symantec: Informe sobre las amenazas para la seguridad en Internet de 2017. Junio-2017 (2017). https://www.symantec.com/es/mx/security-center/threat-report
Stallings, W.: Fundamentos de Seguridad en Redes Aplicaciones y Estándares, Pearson Educación, pp. 28, 31–32, 35, 106, 109 (2004)
Wireshark. https://www.wireshark.org/download.html. Accessed 6 May 2018
Hojabri, M., Venkat, R.K.: Innovation in cloud computing: implementation of Kerberos version 5 in cloud computing in order to enhance the security issues. In: IEEE International Conference on Information Communication and Embedded Systems (ICICES), India (2013)
Al-Ayed, F., Liu, H.: Synopsis of security: using Kerberos method to secure file transfer sessions. In: IEEE International Conference on Computational Science and Computational Intelligence, USA (2016)
Liu, Y., Li, Z., Sun, Y.: Distributed authentication in the cloud computing environment. In: LNCS, vol. 9532. Springer International Publishing Switzerland (2015)
Zhang, N., Wu, X., Yang, C., Shen, Y., Cheng, Y.: A lightweight authentication and authorization solution based on Kerberos. In: IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (2016)
VanDyke Software Inc. Secure File Transfer with SSH (2008)
Arora, M.: How secure is AES against brute force attacks. EE Times 5(7). https://www.eetimes.com/document.asp?doc_id=1279619. Accessed 4 June 2018
Ibañez-Ramírez, A.: Sistema de autenticación para acceso a datos distribuidos basado en Kerberos. UAM-Cuajimalpa, Technical Report (PT-III) (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Ibañez-Ramírez, J.A., López-Fuentes, F.d.A. (2019). Authentication Mechanism to Access Multiple-Domain Multimedia Data. In: Choroś, K., Kopel, M., Kukla, E., Siemiński, A. (eds) Multimedia and Network Information Systems. MISSI 2018. Advances in Intelligent Systems and Computing, vol 833. Springer, Cham. https://doi.org/10.1007/978-3-319-98678-4_55
Download citation
DOI: https://doi.org/10.1007/978-3-319-98678-4_55
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-98677-7
Online ISBN: 978-3-319-98678-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)