A Study on Multi-User Authentication Framework and Security problems for Cloud Computing

M.S Shashidhara, C.P Jaini, K Dayana Devi

Abstract


In Cloud Computing, user authentication is the requirement to restrict illegitimate access of cloud servers. This paper proposes a very strong user authentication as well as authorization framework in which user identification is verified before logging to the cloud server. The proposed framework first provides identity management and mutual authentication between server and user. Second user to user privilege assignment is also carried out so that the second user logins to the server and access the first users allowed data. The first user logically groups the data into various security levels and provides accessibility of selected data to other users. So server checks both the users and then allows the selected data to the second user according to the privileges given. The first user grants the permission up to the given period so that the second user is revoked after the date expiry and not allowed to access the data anymore.

Moreover, both users can change their password, whenever demanded. Password recovery option mechanism is also proposed. Hence the framework provides mutual authentication between server and first user, server and second user and between both users. In addition, various security analysis is carried out which realizes the feasibility of the framework for cloud computing and efficiency is measured.


Keywords


Mutual authentication, Identity management, Access control, distributed computing, Security analysis.

References


Amlan Jyoti Choudhary, Pardeep Kumar, Magal Sain, Hyotack Lim, Hoon Jae-Lee, “A Strong User Authentication Framework for Cloud Computing, 2011 IEEE sia-Pacific Services Computing Conference.

. L.Ponemon, “Security of Cloud Computing Users,” Ponemon Institute, Research Report, May 2010. http://www.ca.com/files/industryresearch/security-cloud-computing-user_235659.pdf.

. F.Gens, 2009, ‘New IDS IT Cloud Services Survey: Top Benefits and Challenges ‘, IDC eXchange, viewed 14 July 2011, http://blogs.idc.com/ieee/?p=730.

S. Lee, I. Ong, H.T. Lim, H.J. Lee, “Two factor authentication for cloud computing”, International journal of KIMICS, vol 8, Pp. 427-432

S.A.Almulla, C.Y. Yeun, “ Cloud Computing security Management”, IInd International Conf. engg systems management and its applications(ICESMA), 2010.

Z.Shen, L. Li, F. Yan, X. Wu, “Cloud Computing System Based on Trusted Computing Platform”, Intelligent Computation Technology and Automation (ICICTA), 2010 International Conference on, Vol 1, Pp 942-945.

A. Celesti, F. Tusa, M. Villari, A. Puliafito, “Security and Cloud Computing: InterCloud Identity Management Infrastructure”, 19th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2010, Pp 263-265.

HP, “Five myths of cloud computing”, Business White Paper.


Full Text: PDF

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

.......................................................................................................................................................................................................................

ISSN  2279 – 0381 |  IST HOMEJOURNAL HOME | Copyright IST 2012-13

.......................................................................................................................................................................................................................