A Novel Cloud Hybrid Access Mechanism for Highly Sensitive Data Exchange
|
|
|
- Aubrey Whitehead
- 9 years ago
- Views:
Transcription
1 A Novel Cloud Hybrid Access Mechanism for Highly Sensitive Data Exchange Elhadj Benkhelifa Faculty of Computing, Eng and Sciences University of Staffordshire Staffordshire, UK Dayan Abishek Fernando Faculty of Computing, Eng and Sciences University of Staffordshire Staffordshire, UK Abstract This paper presents a research contribution from a significant Business-University collaborative Project. The aim of the project is to develop a new disruptive approach for Digital Forensics service provision to enable the creation of new value chains via the Cloud technology. The project is highly complex and multidimensional. The project is concerned with the manipulation and service provision for highly sensitive data via a secure Cloud Service Delivery Platform. This paper reports on one aspect of a long running research program, concerned with Security. The paper presents a relatively novel solution adopted in the project for enhanced security to be implemented as part of the intended Cloud Service Delivery Platform. This solution is a hybrid approach between a Single-Sign-On and Multi-Factor in Federated Settings. Consideration of implementing this solution in the presence of Multi-Tenancy is also discussed in this paper, An aspect which has not been attempted yet, to the best of the authors knowledge. Keywords- Cloud Computing, Single-Sign-on; Multi-Factor ; Cloud Federation; Cloud Security, Multi- Tenancy I. INTRODUCTION Cloud computing is fast becoming a mainstream technology replacing the current practices in IT resource provisioning. The Cloud technology is a disruptive model as it represents a major change to the IT services landscape. Cloud Computing describes a new way of delivering IT services based on Internet protocols, and it typically involves provisioning of dynamically scalable and often virtualized resources [1]. Cloud services offer great benefit to organizations by eliminating complexity of service designing, deploying and configuring. Cloud Computing enables the delivery of services through the on-demand service-provisioning model to end users on a pay as you go basis over a network such as the Internet [1, 2]. Using the Cloud, companies can drive a more efficient, effective, and consumer led commercial that helps them continually reinvent and transform the way they do business, focusing on what makes sense from a business delivery, consumer satisfaction and growth model [1]. Enabling the underlying IT allows businesses to rapidly deliver services, integrate across technological divides, and increase efficiencies; where cost reduction and increased efficiency is a major feature; along with the ability to affect reach, reliability and availability no matter where you are or what time it is. In short, Cloud technology offers a wide spectrum of new digital value chains. However, security is often cited as one of the major concerns in adopting the technology. Cloud services are mainly delivered through three main delivery models Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) [1, 2, 3]. Table 1 summarises the main security concerns for each of the delivery models. TABLE I. Delivery Models SaaS PaaS IaaS MAIN SECURITY CONCERNS ON CLOUD DELIVERY MODELS Security Concerns Data Security App Security Identity Data & Computing Availability Data Security Disaster Recovery Data center construction Physical Security Network Security Transmission Security System Security Examples Google Apps, Oracle SaaS, NetSuite Salesforce Google App Engine, RedHat, Microsoft Azure Heroku Amazon EC2, Verizon, IBM, Rackspace, Nimbus As defined by the American National Institute of Standards and Technology (NIST), Cloud can be deployed in four models: Public and Private Clouds together with less commonly used models, Community and Hybrid Clouds; private Cloud; community Cloud; and hybrid Cloud; [3, 4]. This paper presents a relatively novel solution adopted in a real business case project; funded by a UK research Council to develop a complex Cloud Service Delivery Platform for Digital Forensics [15]. This solution is a hybrid approach between a Single-Sign-On and Multi-Factor in Federated Settings. 19
2 and Identity Management Interoperability challenges in between service providers Inherent limitations in passwords Lack of clarification of multi-tenancy Multi-jurisdiction issues Trust Management and Policy Integration Semantic heterogeneity Jurisdiction issues Trust and interaction/sharing requirements Composition of multiple services to enable bigger application services Figure 1. Delivery models vs. Deployment models. Consideration of implementing this solution in the presence of Multi-Tenancy is also discussed in this paper; an aspect which has not been attempted yet, to the best of the Authors Knowledge (Section IV). The paper also was an opportunity to review the area of Cloud service provision and reflect on the current practices for Cloud access management (Section III) and classifies Security challenges (Section II). Conclusions and direction for future research are summarised in Section V. II. CLOUD SECURITY AND PRIVACY CHALLENGES This section provides a concise summary of the current security and privacy challenges in a Cloud environment based on state of the art classification under five main categories, as illustrated in Figure 2. There are number of security and privacy concerns for today s cloud computing landscape as it incorporates with various technologies including virtualization (i.e. virtual servers, virtual networks), on demand service provisioning, shared resource pools (i.e. data, memory), concurrent access, load balancing and distributed data are some examples [5]. Also big data in cloud has always been a security and privacy challenge due to the velocity, volume and variety of data. As shown in Figure 2, cloud security and privacy challenges can classified in to five main categories.. Figure 2. Cloud Security and Privacy Challenges. Secure Service Management Issues such as price, QOS, and SLAs Automatic and systematic service provisioning; and a composition framework that considers security and privacy issues Privacy and Data Protection Storing data and applications on systems that reside outside of on-premise datacentres Shared infrastructure, risk of potential unauthorized access and exposure. Privacy-protection mechanisms must be embedded in all security solutions. Balancing between data provenance and privacy Organizational Security Management Shared governance Dependence on external entities Insider threat is significantly extended when outsourcing data and processes to Clouds. III. CLOUD ACCESS MANAGEMENT The Cloud Data Management Interface (CDMI) defines the functional interface: to implement strong access controls; provide data encryption; and storage media for secure multitenant Cloud environments; [6] CDMI supports most of standard protocols like File Transfer Protocol (FTP), Storage Area Network (SAN), Network Attached Storage (NAS) and Web Distributed Authoring and Versioning (WebDAV) [7]. Preventing un-lawful access to data resources in the Cloud is a key challenging deliberation. The most significant issue is that the digital identification and framework may not naturally extend into a Cloud environment, thus reengineering the existing framework to support Cloud services may prove to be difficult [8]. Employing two different authentication protocols, one for the internal systems and another for external Cloud-based systems, leads to technical difficulty that can become unusable over time. Identity federation, supported by the introduction of Service Oriented Architectures (SOA), is one solution. Identity federation allows both Cloud service provider and service organisation to trust and exchange digital identities and 20
3 attributes across both domains. As shown in Figure 3, for federation to succeed, identity and access management transactions must be interpreted carefully and unambiguously, and protected against attacks [8, 9]. Federation is enabled by an Authorisation Exchange Standard [10]. Siingle Login Internal Applications Corporate Database Cloud Federation Public Access Gateway Web Applications Federated Identity Solutions and Authorization Standards Figure 3. Single Sign-on based Cloud federation framework. Figure 4. Single Login Multiple Applications. C. Multi-Factor The multi-factor authentication is an authentication method, which requires two or more authentication factors to allow access to the IT resources [13]. As shown in Figure 5, there are three factors involved in establishing the multifactor authentication framework. A. /Authorisation Standards The and Authorisation Standard for Cloud computing defines a set of principles for exchanging authentication and authorisation between security domains. There are a number of protocols like OpenID, UMA, Radius and SAML which provide support to build the authentication and frameworks [10]. The Security Assertion Markup Language (SAML) is the most widespread standard that integrates digital security tokens containing assertions which pass information about a user, protocols and profiles so as to implement authentication and authorisation scenarios which allow secure data exchange between domains [11]. B. Single Sign-On (SSO) As shown in Figure 4, Single Sign-On (SSO) is a process that enables a user to have single user credentials to gain access to multiple applications and resources which have been assigned for the user. SSO allows users to switch between different applications more effectively without any additional authentication requests [11]. Numerous researches have shown the prompt impact of SSO within Cloud industry. Shibboleth IDP, oxauh OP, UMA PDP and LDAP cache are some of the architectures that refer to frameworks to build SSO environments [10, 11]. According to JANET, Shibboleth is the most widely adopted open source federated identity solution developed by the Internet2 middleware group [12]. The latest Shibboleth (V 2.0) builds on top of the SAML 2.0 authentication and authorization standards. Figure 5. Multi-Factor. Research studies have shown that a traditional username and password based Single-factor authentication is no longer strong/scalable enough to support the present security demands of the cloud. This is because compromise of a single factor results in a breach; whereas multi-factor authentication decreases the chance of subversion by having an increase in likelihood of correct identification with every additional factor. The current and widely used trend is twofactor authentication; it is widely spread amongst large financial institutions in Europe [8]. Two-factor authentication can also be found in a number of user-facing applications, such as social networks (Facebook) and Google Applications. Although the two-factor is currently considered the most efficient and very secure scheme, research continues to explore other more effective solutions as Two-factor authentication is already seen being breached. Therefore, an increased factor authentication (eg. threefactor) or hybrid approaches [9, 10], are currently being tested and researched. This paper is an attempt to implement a hybrid authentication approach, using Single-Sign-On together with two-factor authentication whilst considering the multi- Tenancy Scenario (Section IV). This approach is proposed for direct application in a real business case. 21
4 IV. SECURE CREDENTIAL FEDERATION FOR HIGHLY SENSITIVE DATA EXCHANGE Finding a balance between security and simplicity/accessibility is very important [13]. The proposed multi-level, hybrid authentication mechanism based on Single Sign-on (SSO) and two-factor authentication, enables not only Cloud federated access among multiple applications and organizations but also allowing sensitive data exchange between different domains (Figure 7). Two Factor Cloud Federation Federated Identity Solutions and Authorization Standards Highly Sensitive Federated Figure 6. Proposed - Multi-Level Hybrid Mechanism Single-Sign-On provides a unified mechanism to manage and monitor user interactions and business rules, determining user access to Cloud applications and data resources through the internet. Some industries require extra levels of security and identity protection over SSO settings in order to precede some specific secured tasks such as extremely sensitive application/data access, cross-border investigations, and remote data manipulation activities. Therefore, this paper is inspired to introduce a hybrid Cloud access framework by combining multifactor authentication with SSO in order to protect enterprise identities and thus enable a strong authentication method. Figure 6 and 7 illustrate the basic idea of the proposed solution. The proposed hybrid solution comprises of two levels of security access layers providing access to federated resources and further sensitive resources within the federation agenda. The proposed solution defines federated resources as combined Cloud environments and applications for the purpose of resource sharing using single sign on to access multiple applications from multiple locations. Also, this solution allows access to highly sensitive resources within federation settings. Table 2 displays the access matrix vs. authentication of the proposed framework. TABLE II. Data Access \ DIFFERENT RESOURCE ACCESS THROUGH MULTI-LEVEL HYBRID AUTHENTICATION Federated Highly Sensitive Single Sign-on X Two Factor Figure 8 shows the high level access flow of the proposed hybrid access mechanism. The cloud access gateway acts as the doorman at the enterprise perimeter to cloud services and service users. The users can gain access to federated resources simply by providing SSO credentials. If the user need to access sensitive data within the federated settings, then they will be diverted to the two factor authentication for further credentials in order to gain access. Figure 9 illustrates the interaction between cloud components and users, showing how processes operate with one another and the direction in which federated resources are accessed. In a similar manner, Figure 10 displays the enhanced version of accessing sensitive data through two factor authentication. (1) (5) (9) (11) (15) (4) (8) (14) (2) (6) (3) (7) (12) (16) Single Sign on WAYF Identity Provider Single Sign On Federated Two Factor Authenticaion (18) Cloud Access Gateway (10) (13) (17) Two Factor Highly Sensitive Data Highly Sensitive Data Federated from multiple domains and multipal locations Figure 7. Resource Access through Multi-Level Hybrid. Figure 8. Hybrid SSO-Two-Factor Framework. 22
5 A. Cloud Access Process flow 1. Request to access federated resources 2. Redirected to the SSO WAFS (Where are you from) 3. IDP Request 4. Request Credentials 5. Provide Credentials If success Generate SSO Session and pass into the Access Gateway 8. Prompt Status and redirect to federated resource pool 9. Access to Federated 10. Federated 11. Request to access Highly Sensitive Data 12. Redirected to the Two Factor Service 13. Generate Security Token and pass into the Access Gateway 14. Send Security Token via SMS / 15. Enter Security Token 16. Pass token for verification 17. Update SSO session 18. Access to Highly Sensitive Data B. Considering Multi-Tenancy with the Proposed Solution Multi-tenancy is a method of sharing a single instance of data and applications among multiple customers (tenants) by allocating a unique profile for each tenant. Multi-tenancy presents a number of benefits such as: reduced operation cost by sharing resources (software/hardware); increased utilisation /optimisation rate in data centres and instant service provisioning for new clients [14]. However, despite the above-mentioned benefits, multi-tenancy is not widely deployed in the Cloud industry. The balance between resource sharing and security is very constrained and conflicting within a multi-tenancy framework. Also, the present multi-tenancy delivery models (Dedicated resource model, Metadata map model) are either less flexible or less secure (Table 3). The future developments of the proposed hybrid authentication solution will attempt to embed the multi-tenancy architecture where it is believed a mix of dedicated resources and metadata map architectures will deliver stronger security and greater flexibility. To the best of the authors knowledge, this work is unprecedented, due to its complexity and limitations in the current Cloud Technology. TABLE III. Dedicated resource model Increased Security Lower Flexibility MULTI-TENANT DELIVERY MODELS Metadata map model Increased Flexibility Lower Security Cloud Access Gateway SSO Manager Federated Request - Federated Request - Credentials Credentials Prompt - Resource Portal Redirect - Shibboleth IDP Request SSO Session Request - Federated Resource Portal Federated Resource Portal Figure 9. Sequence Diagram Access to Federated. Access Gateway SSO Manager Request - Sensitive Redirect - Shibboleth Request - Credentials Credentials Send Security Token Enter Security Token Prompt - Portal IDP Request SSO Session Redirect - Two Factor Auth Security Token Pass Token for verification Update - SSO Session 2 Factor Manager Request - Sensitive Portal Sensitive Portal Sensitive Figure 10. Sequence Diagram Access to Sensitive. V. CONCLUSION This paper proposes a novel hybrid solution for increased security to be implemented as part of a real business case project. The project is concerned with highly sensitive data, hence a more complex security approach is needed. The proposed hybrid solution, Single-Sign-On and two-factor authentication, is accepted by the project consortium and end-users to be a state-of-the-art and highly secure authentication approach. The proposed framework is currently being tested as part of the project deliverables, and results will be shared in future publications. Immediate future work will investigate the implementation of the proposed framework in the presence of Multi-tenancy, in federated Cloud settings. Another direction for future research is to evaluate the feasibility of implementing more than two factors for authentication. This evaluation will include the readiness of the current Cloud technologies for such enhancement in security and working out the balance under different constraints. 23
6 REFERENCES [1] C. M. DaSilva, P. Trkman, K. C. Desouza, J. Lindic, Disruptive Technologies: A Business Model Perspective on Cloud Computing, [2] C. Chapman, et al., Software architecture definition for ondemand cloud provisioning, Cluster Computing, 2011: pp [3] P. Mell and T. Grance, The NIST Definition of Cloud Computing, 2011 [4] M. Armbrust, et al., A View of Cloud Computing, Communication of ACM, 2010 [5] A. Lenk., et al., What is Inside the Cloud? An Architectural Map of the Cloud Landscape, in Workshop on Software Engineering Challenges of Cloud Computing, Collocated with ICSE 2009, IEEE Computer Society: Vancouver, Canada, [6] SNIA Cloud Data Management Interface (online). Available at URL: [Retrieved: Feb 2013] [7] JSON-RPC project (online). Available at URL: [Retrieved: Feb 2013] [8] P. A. Boampong, L. A. Wahsheh, Different facets of security, Proceedings of the 15th Communications and Networking Simulation Symposium, [9] L. Peterson et al., Slice-based federation architecture, v A2.0.pdf [Retrieved March 2013] [10] K. D. Lewis, J. E. Lewis, Web Single Sign-On using SAML, IJCSI- International Journal of Computer Science Issues, [11] D. Raywood, Google adds two factor authenticationton Gmail via SMS one time passwords, [12] L. M. Vaquero, L. Rodero-Merino, J. Caceres, M. A. Lindner, Break in the Clouds: towards a Cloud definition, [13] M. Trojahn and F. Ortmeier, Biometric authentication through a virtual keyboard for smartphones, in International Journal of Computer Science & Information Technology (IJCSIT), [14] S. Walraven, T. Monheim, E. Truyen, W.J. Sdsd, Towards performance isolation in multi-tenant SaaS applications, Proceedings of the 7th Workshop on Middleware for Next Generation Internet Computing, [15] E. Benkhelifa and D. Fernando, Developing a Complex Cloud Service Delivery Platform: Practical Lessons From Real Business Case. International Conference of Cloud Computing and Services Science (ICCCSS 13), Dubai Jan
Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015
Identity & Management The Cloud Perspective Andrea Themistou 08 October 2015 Agenda Cloud Adoption Benefits & Risks Security Evolution for Cloud Adoption Securing Cloud Applications with IAM Securing Cloud
Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department [email protected]
Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department [email protected] Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
NCTA Cloud Architecture
NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,
How To Understand Cloud Computing
Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition
Integrating Active Directory Federation Services (ADFS) with Office 365 through IaaS
www.thecloudmouth.com Integrating Active Directory Federation Services (ADFS) with Office 365 through IaaS A White Paper Loryan Strant Office 365 MVP Introduction This purpose of this whitepaper is to
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Secure Credential Federation for Hybrid Cloud Environment with SAML Enabled Multifactor Authentication using Biometrics
Secure Credential Federation for Hybrid Cloud Environment with SAML Enabled Multifactor Authentication using Biometrics B.Prasanalakshmi Assistant Professor Department of CSE Thirumalai Engineering College
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Secure Identity in Cloud Computing
Secure Identity in Cloud Computing Michelle Carter The Aerospace Corporation March 20, 2013 The Aerospace Corporation 2013 All trademarks, service marks, and trade names are the property of their respective
A Standards-based Mobile Application IdM Architecture
A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted
managing SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
Swivel Secure and the Cloud
Swivel Secure and the Cloud Authentication for Cloud Application Abstract This document describes the issues relating to authenticating to cloud applications and how the Swivel authentication platform
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101
Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro
ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES
CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009
Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...
Cloud-based Identity and Access Control for Diagnostic Imaging Systems
Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
How To Understand Cloud Usability
Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,
CHAPTER 8 CLOUD COMPUTING
CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
Mobile Cloud Computing Security Considerations
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications
Architectural Implications of Cloud Computing
Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,
White Paper. McAfee Cloud Single Sign On Reviewer s Guide
White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication
Deploying a Geospatial Cloud
Deploying a Geospatial Cloud Traditional Public Sector Computing Environment Traditional Computing Infrastructure Silos of dedicated hardware and software Single application per silo Expensive to size
Adding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
Hybrid Cloud Computing: Security Aspects and Challenges
Hybrid Cloud Computing: Security Aspects and Challenges Roman Nedzelský [email protected] The Faculty of Informatics and Statistics University of Economics Prague, Czech Republic Abstract Nowadays,
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing
CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD. Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas
CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas PART 1 A brief Concept of cloud Issues in cloud Security Issues A BRIEF The Evolution Super
Cloud Computing Technology
Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver [email protected], +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures
CLOUD COMPUTING SECURITY CONCERNS
CLOUD COMPUTING SECURITY CONCERNS ABSTRACT ASMA GULAM MOHAMED Saveetha School of Engineering Cloud computing is set of resources including data storage, programs and hardware offered through the Internet.
Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University
Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University www.infrontconsulting.com Global #1 on System Center Trusted for over a decade Microsoft Partner of the year 2012, 2013 & 2014 #1
Identity Federation Broker for Service Cloud
2010 International Conference on Sciences Identity Federation Broker for Cloud He Yuan Huang 1, Bin Wang 1, Xiao Xi Liu 1, Jing Min Xu 1 1 IBM Research China {huanghey, wangbcrl, liuxx, xujingm}@cn.ibm.com
Interoperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
Data Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102
Cloud Standards Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 2011 IBM Corporation Agenda Overview on Cloud Standards Identity and Access Management Discussion 2 Overview on Cloud
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
TrustedX - PKI Authentication. Whitepaper
TrustedX - PKI Authentication Whitepaper CONTENTS Introduction... 3 1... 4 Use Scenarios... 5 Operation... 5 Architecture and Integration... 6 SAML and OAuth 7 RESTful Web Services 8 Monitoring and Auditing...
Hybrid Cloud Identity and Access Management Challenges
Hybrid Cloud Identity and Access Management Challenges Intro: Timothy P. McAliley [email protected] Microsoft Premier Field Engineer, SQL Server, Washington, DC CISA, CISM, CISSP, ITIL V3,
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
Google Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
Cloud Computing: The Next Computing Paradigm
Cloud Computing: The Next Computing Paradigm Ronnie D. Caytiles 1, Sunguk Lee and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeongdong, Daeduk-gu, Daejeon, Korea [email protected],
Cloud Courses Description
Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk
nexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
Google Apps Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate
CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM
CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM Taha Chaabouni 1 and Maher Khemakhem 2 1 MIRACL Lab, FSEG, University of Sfax, Sfax, Tunisia [email protected] 2 MIRACL Lab, FSEG, University
Microsoft Azure Multi-Factor authentication. (Concept Overview Part 1)
Microsoft Azure Multi-Factor authentication (Concept Overview Part 1) In this Document we will discuss the concept of Azure Multifactor Authentication (MFA) concept, when and how you can use it and what
Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013
Cloud Computing in the Enterprise An Overview For INF 5890 IT & Management Ben Eaton 24/04/2013 Cloud Computing in the Enterprise Background Defining the Cloud Issues of Cloud Governance Issue of Cloud
Cloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
CLOUD COMPUTING SECURITY ISSUES
CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights
Cloud Computing Security Issues And Methods to Overcome
Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &
Top 10 Cloud Risks That Will Keep You Awake at Night
Top 10 Cloud Risks That Will Keep You Awake at Night Shankar Babu Chebrolu Ph.D., Vinay Bansal, Pankaj Telang Photo Source flickr.com .. Amazon EC2 (Cloud) to host Eng. Lab testing. We want to use SalesForce.com
Cloud Essentials for Architects using OpenStack
Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing
PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN
PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN CONNECTING TO THE CLOUD DAVID CHAPPELL DECEMBER 2009 SPONSORED BY AMAZON AND MICROSOFT CORPORATION CONTENTS The Challenge:
CLOUD COMPUTING. When It's smarter to rent than to buy
CLOUD COMPUTING When It's smarter to rent than to buy Is it new concept? Nothing new In 1990 s, WWW itself Grid Technologies- Scientific applications Online banking websites More convenience Not to visit
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
1 The intersection of IAM and the cloud
1 The intersection of IAM and the cloud Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Theory, practice, pros and cons with a focus on enterprise deployments of IAM and cloud
How To Use Salesforce Identity Features
Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.
The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35
FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS
International Journal of Computer Engineering and Applications, Volume VIII, Issue II, November 14 FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS Saju Mathew 1, Dr.
Sentinet for Windows Azure SENTINET
Sentinet for Windows Azure SENTINET Sentinet for Windows Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Isolated Deployment Model... 3 Collocated Deployment Model...
SAML Authentication Quick Start Guide
SAML Authentication Quick Start Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights reserved.
USING FEDERATED AUTHENTICATION WITH M-FILES
M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication
Outlook. Corporate Research and Technologies, Munich, Germany. 20 th May 2010
Computing Architecture Computing Introduction Computing Architecture Software Architecture for Outlook Corporate Research and Technologies, Munich, Germany Gerald Kaefer * 4 th Generation Datacenter IEEE
Guide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1
Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1 Agenda Introduction PAGE 2 Organization Speakers Security Spectrum Information Security Spectrum Oracle Identity Management
Identity in the Cloud Use Cases Version 1.0
Identity in the Cloud Use Cases Version 1.0 Committee Note 01 08 May 2012 Specification URIs This version: http://docs.oasis-open.org/id-cloud/idcloud-usecases/v1.0/cn01/idcloudusecases-v1.0-cn01.pdf (Authoritative)
Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India [email protected]
IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India
Threat Modeling Cloud Applications
Threat Modeling Cloud Applications What You Don t Know Will Hurt You Scott Matsumoto Principal Consultant [email protected] Software Confidence. Achieved. www.cigital.com [email protected] +1.703.404.9293
Mobile Security. Policies, Standards, Frameworks, Guidelines
Mobile Security Policies, Standards, Frameworks, Guidelines Guidelines for Managing and Securing Mobile Devices in the Enterprise (SP 800-124 Rev. 1) http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director
Security Architecture for Cloud Computing Platform
Security Architecture for Cloud Computing Platform SANJAYA DAHAL Master of Science Thesis Stockholm, Sweden 2012 TRITA-ICT-EX-2012:291 Abstract Cloud computing is an innovation of existing technology
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
Cloud Computing Services and its Application
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: [email protected]
Cloud & Security. Dr Debabrata Nayak [email protected]
Cloud & Security Dr Debabrata Nayak [email protected] AGENDA General description of cloud Cloud Framework Top issues in cloud Cloud Security trend Cloud Security Infrastructure Cloud Security Advantages
Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access
Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access Vikas Jain Director, Product Management Intel Corporation Jesper Tohmo CTO, Nordic Edge (an Intel company) Session ID:
Cloud Computing. Cloud computing:
Cloud computing: Cloud Computing A model of data processing in which high scalability IT solutions are delivered to multiple users: as a service, on a mass scale, on the Internet. Network services offering:
Ensuring the Security of Your Company s Data & Identities. a best practices guide
a best practices guide Ensuring the Security of Your Company s Data & Identities Symplified 1600 Pearl Street, Suite 200» Boulder, CO, 80302» www.symplified.com» @Symplified Safe and Secure Identity Management
API-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
