Research Article

Securing Storage Appliances via UNIX based Kerberos Authentication

by  Latesh Kumar K. J
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 65 - Issue 1
Published: March 2013
Authors: Latesh Kumar K. J
10.5120/10888-5784
PDF

Latesh Kumar K. J . Securing Storage Appliances via UNIX based Kerberos Authentication. International Journal of Computer Applications. 65, 1 (March 2013), 17-21. DOI=10.5120/10888-5784

                        @article{ 10.5120/10888-5784,
                        author  = { Latesh Kumar K. J },
                        title   = { Securing Storage Appliances via UNIX based Kerberos Authentication },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 65 },
                        number  = { 1 },
                        pages   = { 17-21 },
                        doi     = { 10.5120/10888-5784 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Latesh Kumar K. J
                        %T Securing Storage Appliances via UNIX based Kerberos Authentication%T 
                        %J International Journal of Computer Applications
                        %V 65
                        %N 1
                        %P 17-21
                        %R 10.5120/10888-5784
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Securing storage systems to use UNIX-based Kerberos version 5 servers for NFS storage authentication using both NFS version 3 and 4. NFS version 4 is the NFS Implementation and mandates Kerberos authentication as part of the NFS client and server specification Integrate their storage systems with Kerberos version 5 to achieve strong NFS storage authentication.

References
  • B. Clifford Neuman and Theodore Ts'o, Kerberos: An Authentication Service for Computer Networks, IEEE Communications 32 (1994), no. 9, 33—38
  • S. M. Bellovin and M. Merritt. Limitations of the kerberos authentication system. Computer Communication Review, 20(5):119-132, October 1990. postscript
  • Prof R. P. Arora, Garima Verma, "Implementation of Authentication and Transaction Security based on Kerberos", IJITCE, Feb 2011 7. .
  • "How Kerberos Authentication Works",Learn Networking on line magazine, Jan'2008
  • Ravi Ganesan, "Yaksha' : Augmenting Kerberos with Public Key cryptography"
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

KDC SEAM MIT NFS CIFS

Powered by PhDFocusTM