SECURE CLOUD AUTHENTICATION USING EIDS
Identification and authentication are essential security functions for regulating access to protected data.Considering that,most cloud service providers rely on weak authentication mechanisms such as username/password schemes.While username/password authentication may be sufficient for simple customized applications,cloud applications in more sensitive areas such as in e-Government require more reliable and secure mechanisms.We close this gap for such cloud applications by applying the STORK framework for secure cloud authentication using eIDs.The STORK framework supports various national eID solutions and will be the relevant eID framework across Europe in future.We demonstrated our approach by enabling eID authentication at two selected public cloud service providers.Finally,we also moved the STORK framework to the cloud to apply the full cloud computing paradigm.
cloud computing authentication identification electronic identity eID
Bernd Zwattendorfer Arne Tauber
E-Government Innovation Center(EGIZ),Graz University of Technology,Graz 8010,Austria
国际会议
杭州
英文
515-519
2012-10-30(万方平台首次上网日期,不代表论文的发表时间)