CFP last date
20 December 2024
Reseach Article

Securing Storage Appliances via UNIX based Kerberos Authentication

by Latesh Kumar K. J
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 65 - Number 1
Year of Publication: 2013
Authors: Latesh Kumar K. J
10.5120/10888-5784

Latesh Kumar K. J . Securing Storage Appliances via UNIX based Kerberos Authentication. International Journal of Computer Applications. 65, 1 ( March 2013), 17-21. DOI=10.5120/10888-5784

@article{ 10.5120/10888-5784,
author = { Latesh Kumar K. J },
title = { Securing Storage Appliances via UNIX based Kerberos Authentication },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 65 },
number = { 1 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 17-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume65/number1/10888-5784/ },
doi = { 10.5120/10888-5784 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:17:32.071651+05:30
%A Latesh Kumar K. J
%T Securing Storage Appliances via UNIX based Kerberos Authentication
%J International Journal of Computer Applications
%@ 0975-8887
%V 65
%N 1
%P 17-21
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Securing storage systems to use UNIX-based Kerberos version 5 servers for NFS storage authentication using both NFS version 3 and 4. NFS version 4 is the NFS Implementation and mandates Kerberos authentication as part of the NFS client and server specification Integrate their storage systems with Kerberos version 5 to achieve strong NFS storage authentication.

References
  1. B. Clifford Neuman and Theodore Ts'o, Kerberos: An Authentication Service for Computer Networks, IEEE Communications 32 (1994), no. 9, 33—38
  2. S. M. Bellovin and M. Merritt. Limitations of the kerberos authentication system. Computer Communication Review, 20(5):119-132, October 1990. postscript
  3. Prof R. P. Arora, Garima Verma, "Implementation of Authentication and Transaction Security based on Kerberos", IJITCE, Feb 2011 7. .
  4. "How Kerberos Authentication Works",Learn Networking on line magazine, Jan'2008
  5. Ravi Ganesan, "Yaksha' : Augmenting Kerberos with Public Key cryptography"
Index Terms

Computer Science
Information Sciences

Keywords

KDC SEAM MIT NFS CIFS