Authentication technology research of ocean environmental information cloud computing

Liu Peishun,Wei Hongyu
2012-01-01
Abstract:A feasible solution for cloud computing security was designed.The solution was based on Kerberos and public key infrastructure(PKI).The authentication theory of Kerberos protocol was analyzed.Then based on the Kerberos protocol and public key encryption system,higher security of identity authentication protocol was designed and applied in cloud computing,solved the problem of password guessing attack,replay attack and time synchronization.It has better security and easy to implement.
What problem does this paper attempt to address?