Addressing the Security Issues of Kerberos Method using RAID Level 5


  •   Mousumi Hasan Mukti

  •   Sabina Zaman

  •   Khalil Ahammad

  •   Chowdhury Shahriar Muzammel


Cloud computing is being considered as a revolutionary technique in the field of enterprise hardware and software design and development. As the popularity of cloud computing is increasing day by day and it’s the mostly used technique in the online and automated business system, so the security of the stored data in the cloud and the accessing method of the data through the network must be ensured. Among the various types of server and network authentication protocol Kerberos is the latest and robust network protocol. For authentication, Kerberos is badly in need of a hosted server which has to be remaining running 24*7 and the access point should be a single server (centralized authentication service). Besides these, if the single server gets down, there is possibility of more attack as Kerberos can’t function its job. These are the major hindrance of Kerberos. This research paper has tried to overcome these security issues, accessing and recovering data by using the RAID level. RAID 5 is the most appropriate technique to recover from failure and in correcting the erroneous data by minimizing redundancy as well as mitigating data loss. Also, RAID 5 can be used in case of distributed data. So, a model has been proposed to configure RAID 5 to ensure better security of cloud storage by overcoming the limitations of Kerberos.

Keywords: Cloud Storage, Cloud Computing, Distributed Data, Kerberos, RAID Level 5, Security


Santosh Khamitkar, Yaser Fuad Al-Dubai, Parag Bhalchandra, Pawan Wasnik”Kerberos Authentication With Cloud Computing Access CONTROL”,International Journal of Advanced Computational Engineering and Networking, ISSN: 2320-2106, Volume-3, Issue-6, June-2015

Abraham Silberchatz,Henry F.Korth, S.Sudarshan “Database System Concepts” in Database Management,6th ed. McGrawhill Education,Ed.New Delhi:McGraw-Hill,2013,pp.446.

Eman El-Emam, Magdy Koutb, Hamdy Kelash and Osama S. Faragallah “An Authentication Protocol Based on Kerberos 5.” International Journal of Network Security, Vol.12, No.2, PP.147–158, Mar. 2011.

Hojabri, Mehdi. "Innovation in cloud computing: Implementation of Kerberos version5in cloud computing in order to enhance the security issues." Information Communication and Embedded Systems (ICICES), 2013 International Conference on. IEEE, 2013.

Thakur, Tanuja, Sachin Dogra, and Yamini Sood. "Replay attack prevention by using a key with random number in kerberos authentication protocol." International Journal of Innovative Research in Science, Engineering and Technology4.7 (2015).

Kumari, Aruna, and Dharmender Singh Kushwaha. "Kerberos style authentication and authorization through CTES model for distributed systems." Computer Networks and Intelligent Computing. Springer, Berlin, Heidelberg, 2011. 457-462.

Abdelmajid, Nabih T., et al. "Location-based kerberos authentication protocol." Social Computing (SocialCom), 2010 IEEE Second International Conference on. IEEE, 2010.

Abraham Silberchatz,Henry F.Korth, S.Sudarshan “Database System Concepts” 6th edition, McGrawhill Education. 2


Download data is not yet available.


How to Cite
Mukti, M.H., Zaman, S., Ahammad, K. and Muzammel, C.S. 2018. Addressing the Security Issues of Kerberos Method using RAID Level 5. European Journal of Engineering and Technology Research. 3, 7 (Jul. 2018), 74–77. DOI: