Skip to main content

Authentication and Authorization Interface Using Security Service Level Agreements for Accessing Cloud Services

  • Conference paper
Contemporary Computing (IC3 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 306))

Included in the following conference series:

Abstract

Cloud computing is defined as delivering of computing resources as a service. Data security and access control are key components for any cloud service. The service level agreements are negotiated when service provider registers with an enterprise. This paper proposes an authentication and authorization interface to access a cloud service. Service selection is acquired via monitoring of security measures provided by a service provider through Security Service Level Agreements (Sec-SLAs). The enterprise and employee validation is performed through two level authentication mechanisms. Single sign on mechanisms for user and services makes the proposal more efficient. Features like denial of service, man in the middle attack and access control rights of employees are also handled. Security measures provided by service provider are handled by an enterprise, thereby, relieving the end user up to 20%-80% from the nitty-gritty of service providers in comparison to the approaches proposed in past, depending on application requirement.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chaves, S.A.D., Westphall, C.B., Lamin, F.R.: SLA Perspective in Security Management for Cloud Computing. In: Sixth International Conference on Networking and Services, pp. 212–217 (2010)

    Google Scholar 

  2. Bernsmed, K., Jaatun, M.G., Meland, P.H., Undheim, A.: Security SLAs for Federated Cloud Services. In: Sixth International Conference on Availability, Reliability and Security, pp. 202–209 (2011)

    Google Scholar 

  3. Kandukuri, B.R., Ramakrishna Paturi, V., Rakshit, A.: Cloud Security Issues. In: IEEE International Conference on Services Computing, pp. 517–520 (2009)

    Google Scholar 

  4. Ahuja, R., De, A., Gabrani, G.: SLA Based Scheduler for Cloud for Storage & Computational Services. In: International Conference on Computational Science and Its Applications, pp. 258–262 (2011)

    Google Scholar 

  5. Clark, K.P., Warnier, M.E., Brazier, F.M.T., Quillinan, T.B.: Secure Monitoring of Service Level Agreements. In: International Conference on Availability, Reliability and Security, pp. 454–461 (2010)

    Google Scholar 

  6. Daniel, D., Lovesum, S.P.J.: A novel approach for scheduling service request in cloud with trust monitor. In: Proceedings of 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies, ICSCCN, pp. 509–513 (2011)

    Google Scholar 

  7. Kubert, R., Wesner, S.: Service level agreements for job control in high performance computting. In: Proceedings of the International Multiconference on Computer Science and Information Technology, pp. 655–661. IEEE (2010)

    Google Scholar 

  8. Liu, P., Zong, R., Liu, S.: A new model for Authentication and Authorization across Heterogeneous Trust-Domain. In: International Conference on Computer Science and Software Engineering, vol. 03, pp. 789–792. IEEE Computer Society (2008)

    Google Scholar 

  9. Pippal, S.K., Kumari, A., Kushwaha, D.K.: CTES based Secure approach for Authentication and Authorization of Resource and Service in Clouds. In: International Conference on Computer & Communication Technology (ICCCT), pp. 444–449 (2011)

    Google Scholar 

  10. Tao, J., Marten, H., Kramer, D., Karl, W.: An Intuitive Framework for Accessing Computing Clouds. In: International Conference on Computational Science, ICCS, pp. 2049–2057 (2011)

    Google Scholar 

  11. Hota, C., Sanka, S., Rajarajan, M., Nair, S.K.: Capability-based Cryptographic Data Access Control in Cloud Computing. Int. J. Advanced Networking and Applications 03, 1152–1161 (2011)

    Google Scholar 

  12. Zhang, X., Hong-tao, D., Chen, J.Q., Lin, Y., Zeng, L.J.: Ensure Data Security in Cloud Storage. In: International Conference on Network Computing and Information Security, pp. 284–287 (2011)

    Google Scholar 

  13. Zhou, X., Tang, X.: Research and Implementation of RSA Algorithm for Encryption and Decryption. In: The 6th International Forum on Strategic Technology, pp. 1118–1121 (2011)

    Google Scholar 

  14. Alhamad, M., Tharam, D., Chang, E.: SLA-Based Trust Model for Cloud Computing. In: 13th International Conference on Network-Based Information Systems, pp. 321–324 (2010)

    Google Scholar 

  15. Sainan, L.: Task-role-based access control model and implementation. In: 2nd International Conference on Education Technology and Computer (ICETC), pp. 293–296 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bajpai, D., Vardhan, M., Kushwaha, D.S. (2012). Authentication and Authorization Interface Using Security Service Level Agreements for Accessing Cloud Services. In: Parashar, M., Kaushik, D., Rana, O.F., Samtaney, R., Yang, Y., Zomaya, A. (eds) Contemporary Computing. IC3 2012. Communications in Computer and Information Science, vol 306. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32129-0_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32129-0_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32128-3

  • Online ISBN: 978-3-642-32129-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics