Title :
Applying an agent-based user authentication and access control model for cloud servers
Author :
Hajivali, Mostafa ; Fatemi Moghaddam, Faraz ; Alrashdan, Maen T. ; Alothmani, Abdualeem Z. M.
Author_Institution :
Fac. of Comput. Sci., Staffordshire Univ., Kuala Lumpur, Malaysia
Abstract :
Cloud computing is an emerging developed technology and the next natural step in the evolution of on-demand information technology services and products that uses concepts of virtualization, storage, processing power, and sharing. According to various researches, access control and user authentication are the most important security concerns and challenging issues in cloud-based environments. Accordingly, this paper offers an agent-based user authentication and access control algorithm based on discretionary and role-based access control model for increasing the reliability and rate of trust in cloud computing environments. The proposed model uses a cloud-based software-as-a-service application with four main agents and a client-based user authentication application. After describing the proposed model, it has been justified and evaluated for identifying the strengths and weaknesses according to defined parameters: Performance, Security, Compatibility, and Power of Intelligence. Moreover, according to the identified limitations, appropriate details have been recommended and further research has been introduced. In overall, the theoretical analysis of the proposed model shows that designing this user authentication and access control model will increase the reliability and rate of trust in cloud computing environments as an emerging and powerful technology in various industries.
Keywords :
authorisation; cloud computing; software agents; trusted computing; virtualisation; access control algorithm; agent-based user authentication; client-based user authentication application; cloud computing environment; cloud servers; cloud-based environment; cloud-based software-as-a-service application; compatibility; discretionary access control model; intelligence; on-demand information technology service; performance parameter; processing power; reliability; role-based access control model; security concern; storage; trust; virtualization; Access control; Authentication; Cloud computing; Computational modeling; Reliability; Servers; Access Control; Agents; Cloud Computing; Software-as-a-Service; User Authentication;
Conference_Titel :
ICT Convergence (ICTC), 2013 International Conference on
Conference_Location :
Jeju
DOI :
10.1109/ICTC.2013.6675484