ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Cloud Authentication Logic on Data Security

Proceeding: The Third International Conference on Digital Security and Forensics (DigitalSec2016)

Publication Date:

Authors : ; ; ; ;

Page : 105-112

Keywords : Authentication; Authorization; Cloud computing; Data Security; Formal Method;

Source : Downloadexternal Find it from : Google Scholarexternal


Cloud computing provides dynamic capacity and capabilities, and it imparts resources as services over the Internet. In cloud computing, information migrated to third parties and it poses enormous security challenges such as privacy leakage and illegal access. This paper presents an authentication logic to protect data from illegal access before and during the usage in cloud computing. Proposed authentication logic can be modified and adapted to different requirements in various types of cloud computing services. It achieved by changing the formulas through assigning new parameters and brings a flexible and reusable authentication model. Decision makings are performed by four functions. The authentication and requirement functions control the access request before the usage. Authorization and obligation functions are executed during the usage based on right requests. The implementation demonstrates the theoretical result of the proposed model.

Last modified: 2016-09-11 23:54:01