Abstract

A plethora of cloud service companies have sprung up in response to the growing amount of data. Data security protection solutions have been proposed by service providers. As a result, a rising number of people are using the cloud to store their own data. However, as technology advances and hackers' capabilities increase, service providers' protection mechanisms become less effective, and data security cannot be guaranteed. We review the logic of the Kerberos algorithm and discuss the work of each part in this paper. This document also includes and discusses difficulties with Kerberos, as well as improvement strategies.The main focus will be on strengthening the security of the Kerberos secure communication process, which will serve as a reference for Kerberos security transmission and authentication research. It solves the problem of the symmetric encryption algorithm's relatively low security in the authentication process by replacing it with the RSA one-time encryption algorithm; in addition, the Kerberos authentication protocol is added between the client and the cloud service provider to secure the data transmission process. Furthermore, this paper explains some basic authentication principles.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call