scispace - formally typeset
Proceedings ArticleDOI

Enhanced framework for verifying user authorization and data correctness using token management system in the cloud

TLDR
The security framework is provided as an architectural model to verify user authorization and data correctness of the resource stored thereby provides guarantee to the data owner for their resource stored into the cloud.
Abstract
Cloud computing is an application and set of services given through the internet. However it is an emerging technology for shared infrastructure but it lacks with an access rights and security mechanism. As it lacks security issues for the cloud users our system focuses only on the security provided through the token management system. It is based on the internet where computing is done through the virtual shared servers for providing infrastructure, software, platform and security as a services. In which security plays an important role in the cloud service. Hence, this security has been given with three types of services such as mutual authentication, directory services, token granting for the resources. Since, existing token issuing mechanism does not provide scalability to large data sets and also increases memory overhead between the client and the server. Hence, our proposed work focuses on providing tokens to the users, which addresses the problem of scalability and memory overhead. The proposed framework of token management system monitors the entire operations of the cloud and there by managing the entire cloud infrastructure. Our model comes under the new category of cloud model known as "Security as a Service". This paper provides the security framework as an architectural model to verify user authorization and data correctness of the resource stored thereby provides guarantee to the data owner for their resource stored into the cloud This framework also describes about the storage of token in a secured manner and it also facilitates search and usage of tokens for auditing purpose and supervision of the users.

read more

Citations
More filters
Journal ArticleDOI

BDSS-FA: A Blockchain-Based Data Security Sharing Platform With Fine-Grained Access Control

TL;DR: A new hierarchical attribute-based encryption algorithm, which uses hierarchical attribute structure and multi-level authorization center, combined with the Fabric blockchain technology to solve the problem of huge decryption cost for users in the Internet of things.
Patent

Identity proxy to provide access control and single sign on

TL;DR: In this paper, a secure tunnel connection between the device and a node with which the security proxy is associated is used to establish the requested connection to the secure proxy, which is then used to determine that the requesting client app is authorized to access the cloud-based service from the device, and to obtain from an identity provider associated with the cloud based service a security token to be used by the client app to authenticate to the cloud.
Proceedings ArticleDOI

A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications

TL;DR: In this paper, the authors focused on the security and privacy challenges of cloud computing with specific reference to user authentication and access management for cloud SaaS applications using a framework that harnesses the stateless and secure nature of JWT for client authentication and session management.
Posted Content

A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications

TL;DR: The suggested model uses a framework that harnesses the stateless and secure nature of JWT for client authentication and session management and portrays a system that is secure, lightweight and highly scalable for improved cloud resource security and management.
Patent

Secure access to cloud-based services

TL;DR: In this article, techniques to provide secure mobile access to a cloud-based service are described. But they do not specify how to obtain a basic authentication header associated with the request.
References
More filters
Proceedings ArticleDOI

Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing

TL;DR: This paper addresses the problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re- Encryption.
Journal ArticleDOI

Examining smart-card security under the threat of power analysis attacks

TL;DR: In this paper, the authors examined the noise characteristics of the power signals and developed an approach to model the signal-to-noise ratio (SNR) using a multiple-bit attack.
Journal ArticleDOI

Remote password authentication with smart cards

TL;DR: A remote password authentication scheme based on the Chinese remainder theorem is proposed that can verify the remote password without verification tables and provide a signature scheme and communication timestamps in the authentication phase against the potential attacks of replaying a previously intercepted login request.
Proceedings ArticleDOI

The security of cloud computing system enabled by trusted computing technology

TL;DR: A model system in which cloud computing system is combined with trusted computing platform with trusted platform module is proposed, in which some important security services, including authentication, confidentiality and integrity, are provided in cloud Computing system.
Related Papers (5)