Abstract
Cloud computing is defined as delivering of computing resources as a service. Data security and access control are key components for any cloud service. The service level agreements are negotiated when service provider registers with an enterprise. This paper proposes an authentication and authorization interface to access a cloud service. Service selection is acquired via monitoring of security measures provided by a service provider through Security Service Level Agreements (Sec-SLAs). The enterprise and employee validation is performed through two level authentication mechanisms. Single sign on mechanisms for user and services makes the proposal more efficient. Features like denial of service, man in the middle attack and access control rights of employees are also handled. Security measures provided by service provider are handled by an enterprise, thereby, relieving the end user up to 20%-80% from the nitty-gritty of service providers in comparison to the approaches proposed in past, depending on application requirement.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chaves, S.A.D., Westphall, C.B., Lamin, F.R.: SLA Perspective in Security Management for Cloud Computing. In: Sixth International Conference on Networking and Services, pp. 212–217 (2010)
Bernsmed, K., Jaatun, M.G., Meland, P.H., Undheim, A.: Security SLAs for Federated Cloud Services. In: Sixth International Conference on Availability, Reliability and Security, pp. 202–209 (2011)
Kandukuri, B.R., Ramakrishna Paturi, V., Rakshit, A.: Cloud Security Issues. In: IEEE International Conference on Services Computing, pp. 517–520 (2009)
Ahuja, R., De, A., Gabrani, G.: SLA Based Scheduler for Cloud for Storage & Computational Services. In: International Conference on Computational Science and Its Applications, pp. 258–262 (2011)
Clark, K.P., Warnier, M.E., Brazier, F.M.T., Quillinan, T.B.: Secure Monitoring of Service Level Agreements. In: International Conference on Availability, Reliability and Security, pp. 454–461 (2010)
Daniel, D., Lovesum, S.P.J.: A novel approach for scheduling service request in cloud with trust monitor. In: Proceedings of 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies, ICSCCN, pp. 509–513 (2011)
Kubert, R., Wesner, S.: Service level agreements for job control in high performance computting. In: Proceedings of the International Multiconference on Computer Science and Information Technology, pp. 655–661. IEEE (2010)
Liu, P., Zong, R., Liu, S.: A new model for Authentication and Authorization across Heterogeneous Trust-Domain. In: International Conference on Computer Science and Software Engineering, vol. 03, pp. 789–792. IEEE Computer Society (2008)
Pippal, S.K., Kumari, A., Kushwaha, D.K.: CTES based Secure approach for Authentication and Authorization of Resource and Service in Clouds. In: International Conference on Computer & Communication Technology (ICCCT), pp. 444–449 (2011)
Tao, J., Marten, H., Kramer, D., Karl, W.: An Intuitive Framework for Accessing Computing Clouds. In: International Conference on Computational Science, ICCS, pp. 2049–2057 (2011)
Hota, C., Sanka, S., Rajarajan, M., Nair, S.K.: Capability-based Cryptographic Data Access Control in Cloud Computing. Int. J. Advanced Networking and Applications 03, 1152–1161 (2011)
Zhang, X., Hong-tao, D., Chen, J.Q., Lin, Y., Zeng, L.J.: Ensure Data Security in Cloud Storage. In: International Conference on Network Computing and Information Security, pp. 284–287 (2011)
Zhou, X., Tang, X.: Research and Implementation of RSA Algorithm for Encryption and Decryption. In: The 6th International Forum on Strategic Technology, pp. 1118–1121 (2011)
Alhamad, M., Tharam, D., Chang, E.: SLA-Based Trust Model for Cloud Computing. In: 13th International Conference on Network-Based Information Systems, pp. 321–324 (2010)
Sainan, L.: Task-role-based access control model and implementation. In: 2nd International Conference on Education Technology and Computer (ICETC), pp. 293–296 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bajpai, D., Vardhan, M., Kushwaha, D.S. (2012). Authentication and Authorization Interface Using Security Service Level Agreements for Accessing Cloud Services. In: Parashar, M., Kaushik, D., Rana, O.F., Samtaney, R., Yang, Y., Zomaya, A. (eds) Contemporary Computing. IC3 2012. Communications in Computer and Information Science, vol 306. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32129-0_38
Download citation
DOI: https://doi.org/10.1007/978-3-642-32129-0_38
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32128-3
Online ISBN: 978-3-642-32129-0
eBook Packages: Computer ScienceComputer Science (R0)