Faraz Fatemi Moghaddam, Nasrin Khanezaei, S. Manavi, M. Eslami, Alireza Samar
{"title":"UAA: User authentication agent for managing user identities in cloud computing environments","authors":"Faraz Fatemi Moghaddam, Nasrin Khanezaei, S. Manavi, M. Eslami, Alireza Samar","doi":"10.1109/ICSGRC.2014.6908723","DOIUrl":null,"url":null,"abstract":"Cloud computing is the realization for a long-held dream of computing as utility of establishment of on-demand IT services. The considerable specifications of this emerging technology have attracted attentions of many users and enterprises in various industries. However, there are some considerable concerns that reduce reliability of cloud-based services. Managing user identities in clouds is one of the most challenging security issues that has led to many performed researches in this area. Hence, an agent-based user authentication model has been presented in this paper to enhance security of cloud computing environments. A unique extension has been provided in the proposed model is to identify the ownership of private individual devices and to establish a reasonable and logical dependency between cloud servers and clients. Furthermore, a provisional access permission algorithm has been presented for un-registered devices to investigate and verify authenticity and correctness of one-time access requests by a higher level of security in comparison with current models. The proposed model has been introduced and evaluated regarding to three main parameters: performance, security, and scalability. The analysis of user authentication agent shows that this model enhances the rate of security and reliability in cloud computing environments without affecting the rate of energy and time consumption, and scalability.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 5th Control and System Graduate Research Colloquium","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSGRC.2014.6908723","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13
Abstract
Cloud computing is the realization for a long-held dream of computing as utility of establishment of on-demand IT services. The considerable specifications of this emerging technology have attracted attentions of many users and enterprises in various industries. However, there are some considerable concerns that reduce reliability of cloud-based services. Managing user identities in clouds is one of the most challenging security issues that has led to many performed researches in this area. Hence, an agent-based user authentication model has been presented in this paper to enhance security of cloud computing environments. A unique extension has been provided in the proposed model is to identify the ownership of private individual devices and to establish a reasonable and logical dependency between cloud servers and clients. Furthermore, a provisional access permission algorithm has been presented for un-registered devices to investigate and verify authenticity and correctness of one-time access requests by a higher level of security in comparison with current models. The proposed model has been introduced and evaluated regarding to three main parameters: performance, security, and scalability. The analysis of user authentication agent shows that this model enhances the rate of security and reliability in cloud computing environments without affecting the rate of energy and time consumption, and scalability.