{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:30:13Z","timestamp":1754155813902,"version":"3.41.2"},"reference-count":27,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2020,9,16]],"date-time":"2020-09-16T00:00:00Z","timestamp":1600214400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJPCC"],"published-print":{"date-parts":[[2021,2,19]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>This paper aims to discuss the Silver and Golden ticket exploits that usually exists in the existing systems. To overcome these challenges, the data is first encrypted and then the ticket is granted to the validated user. The users are validated using the user privileges. The security levels of the proposed model are compared with the existing models and provide a better performance using the Key Distribution Centre (KDC). The number of authentication and authorization levels present in the existing and proposed model is also evaluated.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>The methodology designed in this paper is discussed in this section. The existing models are designed in such a way that the client ID first asked to send an authorization request to the Authentication Server. The server looks up the user in its database and then sends back a ticket generated by it to the client to obtain services for the Service center. Numerous models have some additional features to these systems where the theme of KDC was introduced. The Key Distribution Centre (KDC), which is a set of nodes in a network where the data could be distributed and stored, such that any kind of attack on a single KDC will not impact other KDC and the data stored in it. The nodes other than the KDC in the network are termed as the slave nodes. The slave nodes communicate with each other within the network depending on the topology of the entire network. In this paper, the authors have used the Kerberos protocol for adding more security functions in the entire network. The system developed consists of a client, server and a set of nodes connected to each other in a ring fashion.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The proposed model provides security to the information being used by making use of the Kerberos protocol. Additional features and algorithms such as the use of the ticket-granting approach have been added at the protocol to make it more secure than the existing models. The ticket generation is done at the server-side that makes the user have proper authentication to make use of the services available from the server-side. The model is designed in such a way that it could remain operational even during the time of denial of service. As future work, use of machine learning and deep learning could be used to predict the attack on the network well before it is being misused.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>The paper discusses the Silver and Golden ticket exploits that usually exists in the existing systems. To overcome these challenges, the data is first encrypted and then the ticket is granted to the validated user. The users are validated using the user privileges. The security levels of the proposed model are compared with the existing models and provide a better performance using the Key Distribution Centre (KDC). The number of authentication and authorization levels present in the existing and proposed model is also evaluated.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ijpcc-03-2020-0009","type":"journal-article","created":{"date-parts":[[2020,9,15]],"date-time":"2020-09-15T06:23:01Z","timestamp":1600150981000},"page":"78-88","source":"Crossref","is-referenced-by-count":7,"title":["Trust based authentication scheme (tbas) for cloud computing environment with Kerberos protocol using distributed controller and prevention attack"],"prefix":"10.1108","volume":"17","author":[{"given":"M.B. Benjula","family":"Anbu Malar","sequence":"first","affiliation":[]},{"given":"Prabhu","family":"J.","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2020,9,16]]},"reference":[{"issue":"3","key":"key2021043009214311800_ref001","first-page":"285","article-title":"Implementation of honeypots for server security","volume":"3","year":"2016","journal-title":"International Research Journal of Engineering and Technology (IRJET)"},{"issue":"2011","key":"key2021043009214311800_ref002","article-title":"Amazon web services","volume":"9","author":"Amazon Elastic Compute Cloud","year":"2011","journal-title":"Retrieved November"},{"key":"key2021043009214311800_ref003","first-page":", 281","article-title":"The avispa tool for the automated validation of internet security protocols and applications","volume-title":"International Conference on Computer Aided Verification","year":"2005"},{"year":"2010","first-page":"1","article-title":"Authentication in the clouds: a framework and its application to mobile users","key":"key2021043009214311800_ref004"},{"key":"key2021043009214311800_ref005","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1109\/DSC.2017.23","article-title":"Design and implementation of the components of the symmetric cryptographic algorithm","volume-title":"2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)","year":"2017"},{"issue":"9","key":"key2021043009214311800_ref006","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/35.312841","article-title":"Kerberos: an authentication service for computer networks","volume":"32","year":"1994","journal-title":"IEEE Communications Magazine"},{"issue":"1","key":"key2021043009214311800_ref007","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1145\/1945023.1945039","article-title":"Tainteraser: Protecting sensitive data leaks using application-level taint tracking","volume":"45","year":"2011","journal-title":"ACM SIGOPS Operating Systems Review"},{"issue":"2","key":"key2021043009214311800_ref008","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","article-title":"On the security of public key protocols","volume":"29","year":"1983","journal-title":"IEEE Transactions on Information Theory"},{"year":"2013","article-title":"Replay attack prevention in kerberos authentication protocol using triple password","key":"key2021043009214311800_ref009"},{"key":"key2021043009214311800_ref010","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/945445.945450","article-title":"The google file system","volume-title":"Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles","year":"2003"},{"issue":"4","key":"key2021043009214311800_ref011","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/COMST.2000.5340804","article-title":"A survey of trust in internet applications","volume":"3","year":"2000","journal-title":"IEEE Communications Surveys and Tutorials"},{"year":"2014","first-page":"248","article-title":"From ratings to trust: an empirical study of implicit trust in recommender systems","key":"key2021043009214311800_ref012"},{"issue":"8","key":"key2021043009214311800_ref013","first-page":"17","article-title":"A network authentication protocol based on kerberos","volume":"9","year":"2009","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"issue":"5","key":"key2021043009214311800_ref014","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MIC.2010.83","article-title":"A formal-semantics-based calculus of trust","volume":"14","year":"2010","journal-title":"IEEE Internet Computing"},{"key":"key2021043009214311800_ref015","first-page":"2320","article-title":"Kerberos authentication with cloud computing access control","year":"2015","journal-title":"International Journal of Advanced Computational Engineering and Networking, ISSN"},{"issue":"21","key":"key2021043009214311800_ref016","first-page":"11218","article-title":"A modified approach for kerberos authentication protocol with secret image by using visual cryptographyin","volume":"12","year":"2017","journal-title":"International Journal of Applied Engineering Research"},{"year":"2011","article-title":"The nist definition of cloud computing","key":"key2021043009214311800_ref017"},{"issue":"20","key":"key2021043009214311800_ref018","first-page":"2883","article-title":"Honey pot as a service in cloud in","volume":"118","year":"2018","journal-title":"International Journal of Pure and Applied Mathematics"},{"unstructured":"Rafalovich, Z., Arzi, L., Karidi, R. and Hudis, E. (2012), \u201cPersonalized honeypot for detecting information leaks and security breaches\u201d, US Patent 8,181,250.","key":"key2021043009214311800_ref019"},{"year":"2007","article-title":"An integrative model of organizational trust: past, present, and future","key":"key2021043009214311800_ref020"},{"issue":"3","key":"key2021043009214311800_ref021","first-page":"528","article-title":"Fast detection of transformed data leaks","volume":"11","year":"2015","journal-title":"IEEE Transactions on Information Forensics and Security"},{"volume-title":"RSA Conference (RSA\u201912)","year":"2012","article-title":"The six most dangerous new attack techniques and what\u2019s coming next","key":"key2021043009214311800_ref022"},{"issue":"2016","key":"key2021043009214311800_ref023","article-title":"Kerberos golden ticket protection. Mitigating pass-the-ticket on active directory","volume":"7","year":"2014","journal-title":"CERT-EU Security Whitepaper"},{"issue":"2","key":"key2021043009214311800_ref024","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1145\/356909.356913","article-title":"Security mechanisms in high-level network protocols","volume":"15","year":"1983","journal-title":"ACM Computing Surveys"},{"issue":"2","key":"key2021043009214311800_ref025","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1108\/EUM0000000000550","article-title":"The role of trust and co-operation in marketing channels: a preliminary study","volume":"23","year":"1989","journal-title":"European Journal of Marketing"},{"key":"key2021043009214311800_ref026","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1109\/DSC.2017.61","article-title":"Privacy-preserving attribute-based encryption supporting expressive access structures","volume-title":"2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)","year":"2017"},{"key":"key2021043009214311800_ref027","article-title":"Computing of trust in distributed networks","volume":"56","year":"2003","journal-title":"IACR Cryptology ePrint Archive"}],"container-title":["International Journal of Pervasive Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJPCC-03-2020-0009\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJPCC-03-2020-0009\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:05:19Z","timestamp":1753394719000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ijpcc\/article\/17\/1\/78-88\/382505"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,16]]},"references-count":27,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,9,16]]},"published-print":{"date-parts":[[2021,2,19]]}},"alternative-id":["10.1108\/IJPCC-03-2020-0009"],"URL":"https:\/\/doi.org\/10.1108\/ijpcc-03-2020-0009","relation":{},"ISSN":["1742-7371","1742-7371"],"issn-type":[{"type":"print","value":"1742-7371"},{"type":"print","value":"1742-7371"}],"subject":[],"published":{"date-parts":[[2020,9,16]]}}}