Security Service Level Agreements Based Authentication and Authorization Model for Accessing Cloud Services
Cloud computing is defined as delivering of computing resources as a service. Discovery of reliable resource provider and access control are key components of cloud computing. Service level agreements are negotiated between the service provider and enterprise. This paper proposes authentication interface to access a cloud service. User authentication token is required to validate whether the user is registered employee of enterprise or not. Service authentication token is required to validate the access right of a user for service. Service selection is acquired via monitoring of security measures of services provided by a service provider through security service level agreements at enterprise end. Thereby, completely relieving end user from the nitty-gritty of service providers in comparison to approaches proposed in past. Single sign on mechanisms for user and services is used. Features like Denial of service, man in the middle attack and access control rights of employees are also handled.
KeywordsAuthentication Cloud Denial of Service attack (DOS) Kerberos Services Service Level Agreement Symmetric Encryption
Unable to display preview. Download preview PDF.
- 1.Chaves, S.A.D., Westphall, C.B., Lamin, F.R.: SLA Perspective in Security Management for Cloud Computing. In: Sixth International Conference on Networking and Services, pp. 212–217 (2010)Google Scholar
- 2.Bernsmed, K., Jaatun, M.G., Meland, P.H., Undheim, A.: Security SLAs for Federated Cloud Services. In: Sixth International Conference on Availability, Reliability and Security, pp. 202–209 (2011)Google Scholar
- 3.Kandukuri, B.R., Paturi, V.R., Rakshit, A.: Cloud Security Issues. In: IEEE International Conference on Services Computing, pp. 517–520 (2009)Google Scholar
- 4.Ahuja, R., De, A., Gabrani, G.: SLA Based Scheduler for Cloud for Storage & Computational Services. In: International Conference on Computational Science and Its Applications, pp. 258–262 (2011)Google Scholar
- 5.Clark, K.P., Warnier, M.E., Brazier, F.M.T., Quillinan, T.B.: Secure Monitoring of Service Level Agreements. In: International Conference on Availability, Reliability and Security 2010, pp. 454–461 (2010)Google Scholar
- 6.Daniel, D., Lovesum, S.P.J.: A novel approach for scheduling service request in cloud with trust monitor. In: Proceedings of 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies. ICSCCN, pp. 509–513 (2011)Google Scholar
- 7.Kubert, R., Wesner, S.: Service level agreements for job control in high performance computting. In: Proceedings of the International Multiconference on Computer Science and Information Technology, pp. 655–661. IEEE (2010)Google Scholar
- 8.Liu, P., Zong, R., Liu, S.: A new model for Authentication and Authorization across Heterogeneous Trust-Domain. In: International Conference on Computer Science and Software Engineering, vol. 03, pp. 789–792. IEEE Computer Society (2008)Google Scholar
- 9.Pippal, S.K., Kumari, A., Kushwaha, D.K.: CTES based Secure approach for Authentication and Authorization of Resource and Service in Clouds. In: International Conference on Computer & Communication Technology (ICCCT), pp. 444–449 (2011)Google Scholar
- 10.Tao, J., Marten, H., Kramer, D., Karl, W.: An Intuitive Framework for Accessing Computing Clouds. In: International Conference on Computational Science. ICCS, pp. 2049–2057 (2011)Google Scholar
- 11.Hota, C., Sanka, S., Rajarajan, M., Nair, S.K.: Capability-based Cryptographic Data Access Control in Cloud Computing. Int. J. Advanced Networking and Applications 03, 1152–1161 (2011)Google Scholar
- 12.Zhang, X., Hong-Tao, D., Chen, J.Q., Lin, Y., Zeng, L.J.: Ensure Data Security in Cloud Storage. In: International Conference on Network Computing and Information Security, pp. 284–287 (2011)Google Scholar