T. H. Vo, W. Fuhrmann, K. Fischer-Hellmann, S. Furnell
{"title":"身份即服务中云应用的自动信任协商","authors":"T. H. Vo, W. Fuhrmann, K. Fischer-Hellmann, S. Furnell","doi":"10.1109/COMMNET.2019.8742384","DOIUrl":null,"url":null,"abstract":"In recent years, enterprise applications migrate from a local hosting to a Software-as-a-Service Cloud provider and provide themselves as Cloud services. They may adapt their security infrastructures to a target Cloud provider and may establish a business-to-business relationship with each other manually. Migration of existing applications from a local hosting to a Cloud provider requires substantial adaptation effort in individual architectural components. Existing work has focused on migrating application components with functional and nonfunctional aspects. However, none of them has focused so far on the adaptation of the required security infrastructure. In our previous work, we proposed to decouple the Authentication and Authorisation Infrastructure (AAI) from the business logic of the application as a manageable resource for Cloud providers to control its life cycle. In this paper, we present a novel trust model that enables a dynamic trust relationship between Cloud services. Also, we demonstrate the complete life cycle of the security infrastructure from the development to the migration across multiple Cloud providers. We evaluate the following aspects of Cloud migration: First, the trust relationship is adapted and preserved during the migration. Second, the security infrastructure is portable across Cloud providers as well as interoperable with the protected web service.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Automated Trust Negotiation for Cloud Applications in Identity-as-a-Service\",\"authors\":\"T. H. Vo, W. Fuhrmann, K. Fischer-Hellmann, S. Furnell\",\"doi\":\"10.1109/COMMNET.2019.8742384\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, enterprise applications migrate from a local hosting to a Software-as-a-Service Cloud provider and provide themselves as Cloud services. They may adapt their security infrastructures to a target Cloud provider and may establish a business-to-business relationship with each other manually. Migration of existing applications from a local hosting to a Cloud provider requires substantial adaptation effort in individual architectural components. Existing work has focused on migrating application components with functional and nonfunctional aspects. However, none of them has focused so far on the adaptation of the required security infrastructure. In our previous work, we proposed to decouple the Authentication and Authorisation Infrastructure (AAI) from the business logic of the application as a manageable resource for Cloud providers to control its life cycle. In this paper, we present a novel trust model that enables a dynamic trust relationship between Cloud services. Also, we demonstrate the complete life cycle of the security infrastructure from the development to the migration across multiple Cloud providers. We evaluate the following aspects of Cloud migration: First, the trust relationship is adapted and preserved during the migration. Second, the security infrastructure is portable across Cloud providers as well as interoperable with the protected web service.\",\"PeriodicalId\":274754,\"journal\":{\"name\":\"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)\",\"volume\":\"57 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-04-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMMNET.2019.8742384\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMMNET.2019.8742384","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Automated Trust Negotiation for Cloud Applications in Identity-as-a-Service
In recent years, enterprise applications migrate from a local hosting to a Software-as-a-Service Cloud provider and provide themselves as Cloud services. They may adapt their security infrastructures to a target Cloud provider and may establish a business-to-business relationship with each other manually. Migration of existing applications from a local hosting to a Cloud provider requires substantial adaptation effort in individual architectural components. Existing work has focused on migrating application components with functional and nonfunctional aspects. However, none of them has focused so far on the adaptation of the required security infrastructure. In our previous work, we proposed to decouple the Authentication and Authorisation Infrastructure (AAI) from the business logic of the application as a manageable resource for Cloud providers to control its life cycle. In this paper, we present a novel trust model that enables a dynamic trust relationship between Cloud services. Also, we demonstrate the complete life cycle of the security infrastructure from the development to the migration across multiple Cloud providers. We evaluate the following aspects of Cloud migration: First, the trust relationship is adapted and preserved during the migration. Second, the security infrastructure is portable across Cloud providers as well as interoperable with the protected web service.