Applying an agent-based user authentication and access control model for cloud servers

Cloud computing is an emerging developed technology and the next natural step in the evolution of on-demand information technology services and products that uses concepts of virtualization, storage, processing power, and sharing. According to various researches, access control and user authentication are the most important security concerns and challenging issues in cloud-based environments. Accordingly, this paper offers an agent-based user authentication and access control algorithm based on discretionary and role-based access control model for increasing the reliability and rate of trust in cloud computing environments. The proposed model uses a cloud-based software-as-a-service application with four main agents and a client-based user authentication application. After describing the proposed model, it has been justified and evaluated for identifying the strengths and weaknesses according to defined parameters: Performance, Security, Compatibility, and Power of Intelligence. Moreover, according to the identified limitations, appropriate details have been recommended and further research has been introduced. In overall, the theoretical analysis of the proposed model shows that designing this user authentication and access control model will increase the reliability and rate of trust in cloud computing environments as an emerging and powerful technology in various industries.

[1]  Hua Wang,et al.  Semantic access control for cloud computing based on e-Healthcare , 2012, Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD).

[2]  Feng-qing Zhang,et al.  Applying agents to the data security in cloud computing , 2012, 2012 International Conference on Computer Science and Information Processing (CSIP).

[3]  Faraz Fatemi Moghaddam,et al.  A Hybrid Encryption Algorithm Based on RSA Small-e and Efficient-RSA for Cloud Computing Environments , 2013 .

[4]  Joan Daemen,et al.  AES Proposal : Rijndael , 1998 .

[5]  James A. Thom,et al.  Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.

[6]  Eric Pardede,et al.  MCDB: Using Multi-clouds to Ensure Security in Cloud Computing , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.

[7]  Manuel Oriol,et al.  Security risks and their management in cloud computing , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.

[8]  Ying Peng,et al.  Cloud computing model based on MPI and OpenMP , 2010, 2010 2nd International Conference on Computer Engineering and Technology.