DocumentCode
252591
Title
UAA: User authentication agent for managing user identities in cloud computing environments
Author
Fatemi Moghaddam, Faraz ; Khanezaei, Nasrin ; Manavi, Sina ; Eslami, Mohammad ; Samar, Alireza
Author_Institution
Fac. of Comput. Sci. & IT, U.P.M. Univ., Kuala Lumpur, Malaysia
fYear
2014
fDate
11-12 Aug. 2014
Firstpage
208
Lastpage
212
Abstract
Cloud computing is the realization for a long-held dream of computing as utility of establishment of on-demand IT services. The considerable specifications of this emerging technology have attracted attentions of many users and enterprises in various industries. However, there are some considerable concerns that reduce reliability of cloud-based services. Managing user identities in clouds is one of the most challenging security issues that has led to many performed researches in this area. Hence, an agent-based user authentication model has been presented in this paper to enhance security of cloud computing environments. A unique extension has been provided in the proposed model is to identify the ownership of private individual devices and to establish a reasonable and logical dependency between cloud servers and clients. Furthermore, a provisional access permission algorithm has been presented for un-registered devices to investigate and verify authenticity and correctness of one-time access requests by a higher level of security in comparison with current models. The proposed model has been introduced and evaluated regarding to three main parameters: performance, security, and scalability. The analysis of user authentication agent shows that this model enhances the rate of security and reliability in cloud computing environments without affecting the rate of energy and time consumption, and scalability.
Keywords
authorisation; cloud computing; UAA; agent-based user authentication model; cloud computing environment security enhancement; cloud-based services reliability reduction; unregistered devices; user authentication agent; user identity management; Authentication; Authorization; Cloud computing; Computational modeling; Reliability; Servers; Agent; Cloud Computing; Password Generation; Second Verification; User Authentication;
fLanguage
English
Publisher
ieee
Conference_Titel
Control and System Graduate Research Colloquium (ICSGRC), 2014 IEEE 5th
Conference_Location
Shah Alam
Print_ISBN
978-1-4799-5691-3
Type
conf
DOI
10.1109/ICSGRC.2014.6908723
Filename
6908723
Link To Document