A distributed expansible authentication model based on Kerberos

被引:15
作者
Liu, Hongjun [1 ,2 ]
Luo, Ping [1 ]
Wang, Daoshun [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, TNlist, Beijing 100084, Peoples R China
[2] Sino I Technol Ltd, Multi Media Dept, Beijing 100176, Peoples R China
基金
中国国家自然科学基金;
关键词
Identity authentication; Expansibility; Kerberos; Rigorous binary tree code algorithm; Server bottleneck;
D O I
10.1016/j.jnca.2007.12.003
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There is a potential server bottleneck problem when the Kerberos model is applied in large-scale networks because the model uses centralized management. To enlarge its application scope, researchers must consider how to build a trust relation among those Kerberos servers located on different isolated domains, but have not provided a way to prevent the potential bottleneck that can occur with Kerberos servers. With the development of across-domain authentication techniques, the local server bottleneck problem has not been alleviated; in fact, it has become more serious. Adopting the rigorous binary tree code algorithm, we present an authentication model based on Kerberos. Compared with similar models, our model has several advantages. First, it overcomes the potential server bottleneck problem and can balance the load automatically. Second, it can process across-domain authentication and enlarge the authentication boundary. Finally, its authentication path is short, with no more than two Kerberos servers being involved when authenticating a user. (C) 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:472 / 486
页数:15
相关论文
共 12 条
[1]   PROJECT ATHENA AS A DISTRIBUTED COMPUTER-SYSTEM [J].
CHAMPINE, GA ;
GEER, DE ;
RUH, WN .
COMPUTER, 1990, 23 (09) :40-51
[2]  
Kim C, 2004, LECT NOTES COMPUT SC, V3032, P972
[3]  
Kohl J. T., 1993, RFC1510
[4]   A structured hierarchical P2P model based on a rigorous binary tree code algorithm [J].
Liu, Hongjun ;
Luo, Ping ;
Zeng, Zhifeng .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2007, 23 (02) :201-208
[5]  
*NAT I STAND TECHN, 1993, 180 NIST FIPS PUB US
[6]   USING ENCRYPTION FOR AUTHENTICATION IN LARGE NETWORKS OF COMPUTERS [J].
NEEDHAM, RM ;
SCHROEDER, MD .
COMMUNICATIONS OF THE ACM, 1978, 21 (12) :993-999
[7]   KERBEROS - AN AUTHENTICATION SERVICE FOR COMPUTER-NETWORKS [J].
NEUMAN, BC ;
TSO, T .
IEEE COMMUNICATIONS MAGAZINE, 1994, 32 (09) :33-38
[8]  
NEUMAN BC, 1996, PUBLIC KEY CRYPTOGRA
[9]  
NEUMAN C, 2005, RFC4120 USC INF SCI
[10]  
RIVEST RL, 1992, RFC1320