Local authentication and authorization system for immediate setup of cloud environments

Many cloud solutions are a combination of complex components, which require a lot of time to install and to configure. This includes the setup or the adjustment of firewall policies and changes of many other system and infrastructure settings. Furthermore, additional software products are required, especially to setup a suitable and complex identity management. In this paper, we introduce a concept, which enables a fast and immediate setup of cloud environment without a time-consuming overhead for installation and configuration of third-party solutions for identity management. The mapping between cloud resources to the permission management of any Unix-like operating system plays the central role, besides a strong separation of cloud middleware and operating System interactions.

[1]  Tadeusz Pietraszek,et al.  Defending Against Injection Attacks Through Context-Sensitive String Evaluation , 2005, RAID.

[2]  Odej Kao,et al.  Hardware as a Service (HaaS): Physical and virtual hardware on demand , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.

[3]  T. Howes The Lightweight Directory Access Protocol: X.500 Lite , 1995 .

[4]  A. Bendahmane,et al.  Grid computing security mechanisms: State-of-the-art , 2009, 2009 International Conference on Multimedia Computing and Systems.

[5]  Sébastien Varrette,et al.  Practical Authentication in Distributed Environments , 2005 .

[6]  Yaodong Li,et al.  Study and Implementation of SELinux-Like Access Control Mechanism Based on Linux , 2008 .

[7]  A. Stanik,et al.  Hardware as a Service (HaaS): The completion of the cloud stack , 2012, 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT).

[8]  Katarina Stanoevska-Slabeva,et al.  Grid and Cloud Computing, A Business Perspective on Technology and Applications , 2009, Grid and Cloud Computing.

[9]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..