DocumentCode :
1989561
Title :
Inter-Cloud Authentication through X.509 for defense organization
Author :
Arifeen, Fahan Ul ; Siddiqui, Raees A. ; Ashraf, Sajjad ; Waheed, Salman
Author_Institution :
Shaheed Zulfikar Ali Bhutto Inst. of Sci. & Technol. (SZABIST), Islamabad, Pakistan
fYear :
2015
fDate :
13-17 Jan. 2015
Firstpage :
299
Lastpage :
306
Abstract :
Over the recent years of research in cloud computing, different approaches are adopted for Inter-Cloud Authentication. These approaches give successful results in identifying the authentic request. Defense organization communicate with each other´s through legitimate requests. For establishing a security and privacy, a PKI based authentication model is needed. This paper signifies a new approach in implementing cloud based PKI authentication inside the existing infrastructure of defense organization. As security is the prime concern for any organization and its implementation requirement varies from organization to organization, each and every organization embrace their own policies to implement it. The problem of understanding each other´s security policies is a huge barrier and challenge for existing IT infrastructure for implementation purposes. Requirement to establish Inter-Cloud Authentication is made possible through this PKI based model which ensures all five security services i.e. confidentiality, integrity, authentication, digital signature and non-repudiation. This PKI model is a multi-domain atmosphere between various defense organization and their Data Centers (DC) for the facilitation and resource provisioning inside the cloud platform. This model utilizes the existing network infrastructure composed of high intercommunication traffic between various Data Centers of defense organization. In this model, a nationwide Certification Authority (CA) is implemented in the Inter-Cloud infrastructure and all other Data Centers are inter-communicated through this mechanism having different authentication approaches for legitimate access through the X.509 Certificates.
Keywords :
cloud computing; computer centres; computer network security; data integrity; data privacy; digital signatures; organisational aspects; public key cryptography; telecommunication traffic; IT infrastructure; PKI based authentication model; X.509; certification authority; cloud based PKI authentication; cloud computing; cloud platform; data center; data confidentiality; data integrity; data privacy; defense organization; digital signature; intercloud authentication; intercloud infrastructure; intercommunication traffic; multidomain atmosphere; network infrastructure; non-repudiation; resource provisioning; security policies; security services; Hardware; Organizations; Public key cryptography; Software; Virtual private networks; Certification Authority (CA); Data Centers; Inter-Cloud; Master CA; Public Key Infrastructure (PKI); VPN; X.509 Certificate Services;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Applied Sciences and Technology (IBCAST), 2015 12th International Bhurban Conference on
Conference_Location :
Islamabad
Type :
conf
DOI :
10.1109/IBCAST.2015.7058520
Filename :
7058520
Link To Document :
بازگشت