Skip to main content

Security Service Level Agreements Based Authentication and Authorization Model for Accessing Cloud Services

  • Conference paper

Part of the Advances in Intelligent Systems and Computing book series (AISC,volume 176)

Abstract

Cloud computing is defined as delivering of computing resources as a service. Discovery of reliable resource provider and access control are key components of cloud computing. Service level agreements are negotiated between the service provider and enterprise. This paper proposes authentication interface to access a cloud service. User authentication token is required to validate whether the user is registered employee of enterprise or not. Service authentication token is required to validate the access right of a user for service. Service selection is acquired via monitoring of security measures of services provided by a service provider through security service level agreements at enterprise end. Thereby, completely relieving end user from the nitty-gritty of service providers in comparison to approaches proposed in past. Single sign on mechanisms for user and services is used. Features like Denial of service, man in the middle attack and access control rights of employees are also handled.

Keywords

  • Authentication
  • Cloud
  • Denial of Service attack (DOS)
  • Kerberos
  • Services
  • Service Level Agreement
  • Symmetric Encryption

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-642-31513-8_73
  • Chapter length: 10 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   299.00
Price excludes VAT (USA)
  • ISBN: 978-3-642-31513-8
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   379.99
Price excludes VAT (USA)

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chaves, S.A.D., Westphall, C.B., Lamin, F.R.: SLA Perspective in Security Management for Cloud Computing. In: Sixth International Conference on Networking and Services, pp. 212–217 (2010)

    Google Scholar 

  2. Bernsmed, K., Jaatun, M.G., Meland, P.H., Undheim, A.: Security SLAs for Federated Cloud Services. In: Sixth International Conference on Availability, Reliability and Security, pp. 202–209 (2011)

    Google Scholar 

  3. Kandukuri, B.R., Paturi, V.R., Rakshit, A.: Cloud Security Issues. In: IEEE International Conference on Services Computing, pp. 517–520 (2009)

    Google Scholar 

  4. Ahuja, R., De, A., Gabrani, G.: SLA Based Scheduler for Cloud for Storage & Computational Services. In: International Conference on Computational Science and Its Applications, pp. 258–262 (2011)

    Google Scholar 

  5. Clark, K.P., Warnier, M.E., Brazier, F.M.T., Quillinan, T.B.: Secure Monitoring of Service Level Agreements. In: International Conference on Availability, Reliability and Security 2010, pp. 454–461 (2010)

    Google Scholar 

  6. Daniel, D., Lovesum, S.P.J.: A novel approach for scheduling service request in cloud with trust monitor. In: Proceedings of 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies. ICSCCN, pp. 509–513 (2011)

    Google Scholar 

  7. Kubert, R., Wesner, S.: Service level agreements for job control in high performance computting. In: Proceedings of the International Multiconference on Computer Science and Information Technology, pp. 655–661. IEEE (2010)

    Google Scholar 

  8. Liu, P., Zong, R., Liu, S.: A new model for Authentication and Authorization across Heterogeneous Trust-Domain. In: International Conference on Computer Science and Software Engineering, vol. 03, pp. 789–792. IEEE Computer Society (2008)

    Google Scholar 

  9. Pippal, S.K., Kumari, A., Kushwaha, D.K.: CTES based Secure approach for Authentication and Authorization of Resource and Service in Clouds. In: International Conference on Computer & Communication Technology (ICCCT), pp. 444–449 (2011)

    Google Scholar 

  10. Tao, J., Marten, H., Kramer, D., Karl, W.: An Intuitive Framework for Accessing Computing Clouds. In: International Conference on Computational Science. ICCS, pp. 2049–2057 (2011)

    Google Scholar 

  11. Hota, C., Sanka, S., Rajarajan, M., Nair, S.K.: Capability-based Cryptographic Data Access Control in Cloud Computing. Int. J. Advanced Networking and Applications 03, 1152–1161 (2011)

    Google Scholar 

  12. Zhang, X., Hong-Tao, D., Chen, J.Q., Lin, Y., Zeng, L.J.: Ensure Data Security in Cloud Storage. In: International Conference on Network Computing and Information Security, pp. 284–287 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Durgesh Bajpai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bajpai, D., Vardhan, M., Gupta, S., Kumar, R., Kushwaha, D.S. (2012). Security Service Level Agreements Based Authentication and Authorization Model for Accessing Cloud Services. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_73

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31513-8_73

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31512-1

  • Online ISBN: 978-3-642-31513-8

  • eBook Packages: EngineeringEngineering (R0)