Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Security Service Level Agreements Based Authentication and Authorization Model for Accessing Cloud Services

  • Conference paper
Advances in Computing and Information Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 176))

Abstract

Cloud computing is defined as delivering of computing resources as a service. Discovery of reliable resource provider and access control are key components of cloud computing. Service level agreements are negotiated between the service provider and enterprise. This paper proposes authentication interface to access a cloud service. User authentication token is required to validate whether the user is registered employee of enterprise or not. Service authentication token is required to validate the access right of a user for service. Service selection is acquired via monitoring of security measures of services provided by a service provider through security service level agreements at enterprise end. Thereby, completely relieving end user from the nitty-gritty of service providers in comparison to approaches proposed in past. Single sign on mechanisms for user and services is used. Features like Denial of service, man in the middle attack and access control rights of employees are also handled.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Chaves, S.A.D., Westphall, C.B., Lamin, F.R.: SLA Perspective in Security Management for Cloud Computing. In: Sixth International Conference on Networking and Services, pp. 212–217 (2010)

    Google Scholar 

  2. Bernsmed, K., Jaatun, M.G., Meland, P.H., Undheim, A.: Security SLAs for Federated Cloud Services. In: Sixth International Conference on Availability, Reliability and Security, pp. 202–209 (2011)

    Google Scholar 

  3. Kandukuri, B.R., Paturi, V.R., Rakshit, A.: Cloud Security Issues. In: IEEE International Conference on Services Computing, pp. 517–520 (2009)

    Google Scholar 

  4. Ahuja, R., De, A., Gabrani, G.: SLA Based Scheduler for Cloud for Storage & Computational Services. In: International Conference on Computational Science and Its Applications, pp. 258–262 (2011)

    Google Scholar 

  5. Clark, K.P., Warnier, M.E., Brazier, F.M.T., Quillinan, T.B.: Secure Monitoring of Service Level Agreements. In: International Conference on Availability, Reliability and Security 2010, pp. 454–461 (2010)

    Google Scholar 

  6. Daniel, D., Lovesum, S.P.J.: A novel approach for scheduling service request in cloud with trust monitor. In: Proceedings of 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies. ICSCCN, pp. 509–513 (2011)

    Google Scholar 

  7. Kubert, R., Wesner, S.: Service level agreements for job control in high performance computting. In: Proceedings of the International Multiconference on Computer Science and Information Technology, pp. 655–661. IEEE (2010)

    Google Scholar 

  8. Liu, P., Zong, R., Liu, S.: A new model for Authentication and Authorization across Heterogeneous Trust-Domain. In: International Conference on Computer Science and Software Engineering, vol. 03, pp. 789–792. IEEE Computer Society (2008)

    Google Scholar 

  9. Pippal, S.K., Kumari, A., Kushwaha, D.K.: CTES based Secure approach for Authentication and Authorization of Resource and Service in Clouds. In: International Conference on Computer & Communication Technology (ICCCT), pp. 444–449 (2011)

    Google Scholar 

  10. Tao, J., Marten, H., Kramer, D., Karl, W.: An Intuitive Framework for Accessing Computing Clouds. In: International Conference on Computational Science. ICCS, pp. 2049–2057 (2011)

    Google Scholar 

  11. Hota, C., Sanka, S., Rajarajan, M., Nair, S.K.: Capability-based Cryptographic Data Access Control in Cloud Computing. Int. J. Advanced Networking and Applications 03, 1152–1161 (2011)

    Google Scholar 

  12. Zhang, X., Hong-Tao, D., Chen, J.Q., Lin, Y., Zeng, L.J.: Ensure Data Security in Cloud Storage. In: International Conference on Network Computing and Information Security, pp. 284–287 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Durgesh Bajpai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bajpai, D., Vardhan, M., Gupta, S., Kumar, R., Kushwaha, D.S. (2012). Security Service Level Agreements Based Authentication and Authorization Model for Accessing Cloud Services. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_73

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31513-8_73

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31512-1

  • Online ISBN: 978-3-642-31513-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics