Abstract
Security is an important aspect in an open environment. When two or more entities want to communicate, an entity must be aware about the other entity to whom he/she is communicating. Therefore there has to be a mechanism which will ensure the identities of different entities. As cryptanalysts left no stone unturned to decipher the code, therefore there has to be a mechanism to ensure that only authorized entity will be able to get the encryption−decryption code and it should be available only for limited time or on temporary basis so that no one should have time to analyze the code. As code will only be available to authorized entities, they should be able to get it on any machine. The proposed architecture will cover all the given aspects and it will provide authentication, confidentiality, availability as software as a service.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sharma, V., Gola, K.K., Khan, G., Rathore, R.: Key sharing technique to preserve integrity and confidentiality. In: Second International Conference on Advances in Computing and Communication Engineering, IEEE Computer Society (2015) doi: 10.1109/ICACCE.2015.48
Kohl, J.T., Neuman, B.C.: The kerberos network authentication service, version 5 revision 5, Project Athena, Massachusetts Institute of Technology (1992)
Sudha, M., Rao, B.R.K., Monica, M.: A comprehensive approach to ensure secure data communication in cloud environment. Int. J. Comput. Appl. (0975–8887) Volume 12– No. 8, December 2010
Graham, S.L., Rivest, R.L.: Secure communications over insecure channels. Commun. ACM 21(4) (1978)
Shinde, K.M., Shahabade, R.V.: Security in WLAN using Kerberos nternational. J. Sci. Res. Publ. 4(6) (2014)
Harb, H.M., Mahdy, Y.B.: Overcoming Kerberos structural limtions, Nishidha laboratory. http://www.ii.ist.i.kyoto-u.ac.jp/~yasser/Publications/pdf OvercomingKerberosLimitationsOneColumn.pdf pp. 1–12
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Vaibhav Sharma, Gola, K.K. (2016). ASCCS: Architecture for Secure Communication Using Cloud Services. In: Pant, M., Deep, K., Bansal, J., Nagar, A., Das, K. (eds) Proceedings of Fifth International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 437. Springer, Singapore. https://doi.org/10.1007/978-981-10-0451-3_3
Download citation
DOI: https://doi.org/10.1007/978-981-10-0451-3_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0450-6
Online ISBN: 978-981-10-0451-3
eBook Packages: EngineeringEngineering (R0)