A Secure Cloud Server Using Raspberry Pi and Kerberos Authentication Protocol
Keywords:
Raspberry Pi, Kerberos Authentication protocol, Cloud Server, Security, Client Server AuthenticationAbstract
An internet based computing where number of servers situated remotely are inter-connected to each other and access to some services are allowed online is framed as Cloud Computing. But the existing systems require very expensive hardware and the power consumption is also high. Also the existing systems are quite complex and usually require larger area to install along with high maintenance cost. So the idea is to propose a system where users can store their data over the cloud and retrieve their data from any part of the world. The proposed system not only provides reliable file storage but also provides high security. This proposed system uses Raspberry Pi which is a single-board computer; small in size to develop a cloud server which will be secured as well as less expensive. For security, the proposed system uses Kerberos authentication protocol which will act as a third-party service that will be used to authenticate the user’s identity. It will act as a bridge between the user and the cloud storage.
References
[1] “Cloud: Research problems in data center networks,”
ACM SIGCOMM Computer Communication Review,
vol. 39, no. 1, January 2009.
[2] Fung Po Tso, David R. White, Simon Jouet, Jeremy
Singer, Dimitros P.Pezaros “The Galsgow Raspberry
Pi Cloud: A Scale Model for Cloud Computing
Services” School of Computing Science, University of
Glasgow.
[3] Tim Cox, “Raspberry Pi Cookbook for Python
Programmers” Page 19.
[4] Clifford Neuman and Theodore TS‘O “Kerberos: an
authentication service for computer networks” inf. Sci.
Inst., University of Southern California, Marina Del
Rey, CA, US.
[5] www.raspberrypi.org
[6] Andrew K. Dennis, “Raspberry Pi Super Cluster” Page
14.
[7] Chundong Wang, Charonn Feng “Security Analysis
and Improvement for Kerberos Based on Dynamic
Password and Diffile-Hellman Algorithm” Tianjin
Key Laboratory of Intelligence Computing and Novel
Software Technology, Tianjin University of
Technology, China.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Ansari A, Ansari T, Hingora F, Ansari M

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
