TY - JOUR ID - TI - Analysis and Implementation of Kerberos Protocol in Hybrid Cloud Computing Environments AU - Turkan A. Khaleel PY - 2021 VL - 39 IS - 1part (B) Science SP - 41 EP - 52 JO - Engineering and Technology Journal مجلة الهندسة والتكنولوجيا SN - 16816900 24120758 AB - The concept of cloud computing has recently changed how hardware,software, and information are handled. However, security challenges andcredibility requirements have never changed and may have increased.Protecting cloud computing and providing security for its resources andusers is one of the critical challenges. As a result, most users are afraid touse their resources, because many security problems must be met. Forexample, authentication and reliability are major security constraints andmust be provided in a cloud computing environment. There is a wide rangeof authentication protocols in use, but the researcher has recommendedthe Kerberos protocol to represent and test it in a complex environmentsuch as a mixed cloud environment.A model has been developed to implement Kerberos authentication in ahybrid cloud computing environment to securely access the cloudcomputing services provided. This model is represented using the OPNETModeler 14.5 simulation system. The network efficiency was measuredbefore and after the hacker. Findings presented in this research aresupporting the ability of the Kerberos protocol to prevent illegal access tocloud computing services, whether from within the private cloud or thepublic cloud. While maintaining the efficient performance of the network

ER -