Cloud Authentication Logic on Data Security
Proceeding: The Third International Conference on Digital Security and Forensics (DigitalSec2016)Publication Date: 2016-09-06
Authors : Maryam Shahpasand; Muhammad Ehsan Rana; Ramlan Mahmod; Nur Izura Udzir;
Page : 105-112
Keywords : Authentication; Authorization; Cloud computing; Data Security; Formal Method;
Abstract
Cloud computing provides dynamic capacity and capabilities, and it imparts resources as services over the Internet. In cloud computing, information migrated to third parties and it poses enormous security challenges such as privacy leakage and illegal access. This paper presents an authentication logic to protect data from illegal access before and during the usage in cloud computing. Proposed authentication logic can be modified and adapted to different requirements in various types of cloud computing services. It achieved by changing the formulas through assigning new parameters and brings a flexible and reusable authentication model. Decision makings are performed by four functions. The authentication and requirement functions control the access request before the usage. Authorization and obligation functions are executed during the usage based on right requests. The implementation demonstrates the theoretical result of the proposed model.
Other Latest Articles
- Using Mutual Information for Feature Selection in Network Intrusion Detection System
- Filtering Avoidance Using Web Translation Service and its Countermeasures
- Awareness of Cloud Storage Forensics amongst the Malaysian Users
- Method for Detecting a Malicious Domain by Using WHOIS and DNS Features
- Fingerprinting Violating Machines with TCP Timestamps
Last modified: 2016-09-11 23:54:01