Identity Security Using Authentication and Authorization in Cloud Computing

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends  (IJCOT)          
 
© 2013 by IJCOT Journal
Volume-3 Issue-2                          
Year of Publication : May 2013
Authors :   D.Ranjith, J.Srinivasan

Citation

  D.Ranjith, J.Srinivasan      "Identity Security Using Authentication and Authorization in Cloud Computing"International Journal of Computer & organization Trends  (IJCOT), V3(2):46-53 Mar - Apr 2013, ISSN:2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.

Abstract:-The Growth of the Cloud Computing invention suggests attractive and innovative computing services through resource pooling and virtualization techniques. Cloud gives delivers different types of Computing Services to their consumers according to their pay per usage of economic model. Anyhow this new technology introduces new immerse for enterprises and bussiness admired their security and privacy. The new cloud services are Security as a service (Saas). This model is mainly for Security enhancemet of a cloud environment. This is a way of gathering security solution under the control of security specialists. Identify and Access control services are the area of security, and sometimes are presented under the term identiy as a service.

References

[1] National Institute of Standards and Technology (NIST), “The NIST Definition of Cloud Computing.” Sep-2011. [2] B. Sosinsky, Cloud Computing Bible, 1st ed. Wiley, 2011. [3] P. Kalagiakos and P. Karampelas, “Cloud Computing learning,” in 2011 5th International Conference on Application of Information and Communication Technologies (AICT), 2011, pp. 1 –4. [4] W. Liu, “Research on cloud computing security problem and strategy,” in 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), 2012, pp. 1216 –1219. [5] Cloud Security Alliance, “Top Threats to Cloud Computing V1.0.” Mar-2010. [6] K. Popovic and Z. Hocenski, “Cloud computing security issues and challenges,” in 2010 Proceedings of the 33rd International Convention MIPRO, 2010, pp. 344 –349. [7] X. Tan and B. Ai, “The issues of cloud computing security in high-speed railway,” in International Conference on Electronic and Mechanical Engineering and Information Technology (EMEIT), 2011, vol. 8, pp. 4358 –4363. [8] J.Srinivasan and D.Ranjith,”Impact of Database Security in Cloud Computing”, Proceedings of International Conference on Global Innovations in Technology and Sciences, 2013, pp.263-267. [9] The White House, Washington, “National Strategy for Trusted Identities in Cyberspace.” Apr-2011. [10] Federal Identity, Credentialing, and Access Management, “Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile.” 16-Dec-2011. [11] Organization for the Advancement of Structured Information Standards (OASIS), “Reference Model for Service Oriented Architecture v 1.0.” 12-Oct-2006. [12] World Wide Web Consortium (W3C), “Web Services Architecture.” 11-Feb-2004. [13] A. J. Choudhury, P. Kumar, M. Sain, H. Lim, and H. Jae-Lee, “A Strong User Authentication Framework for Cloud Computing,” in Services Computing Conference (APSCC), 2011 IEEEAsia-Pacific, 2011, pp. 110 –115. [14] A. G. Revar and M. D. Bhavsar, “Securing user authentication using single sign-on in Cloud Computing,” in 2011 Nirma University International Conference on Engineering (NUiCONE), 2011, pp. 1 –4. [15] Organization for the Advancement of Structured Information Standards (OASIS), “Security Assertion Markup Language (SAML) V2.0 Technical Overview.” 25-Mar-2008. [16] M. Lorch, D. Kafura, and S. Shah, “An XACML-based policy management and authorization service for globus resources,” in Fourth International Workshop on Grid Computing, 2003.Proceedings, 2003, pp. 208 – 210. [17] G.J. Ahn, H. Hu, J. Lee, and Y. Meng, “Representing and Reasoning about Web Access Control Policies,” in Computer Software and Applications Conference (COMPSAC), 2010IEEE 34th Annual, 2010, pp. 137 –146. [18] A. L. Pereira, “RBAC for High Performance Computing Systems Integration in Grid Computing and Cloud Computing,” in 2011 IEEE International Symposium on Parallel andDistributed Processing Workshops and Phd Forum (IPDPSW), 2011, pp. 914 –921. [19] Organization for the Advancement of Structured Information Standards (OASIS), “Extensible Access Control Markup Language (XACML) Version 3.0.” 10-Aug-2010. [20] Organization for the Advancement of Structured Information Standards (OASIS), “XACML Profile for Role Based Access Control (RBAC).” 13-Feb-2004.

Keywords

Cloud Computing,Authentication and Authorization, Security threats.