Font Size: a A A

Research And Design On An Identity Authentitacion Service Based On Cloud Service

Posted on:2014-02-27Degree:MasterType:Thesis
Country:ChinaCandidate:Q LvFull Text:PDF
GTID:2248330398970744Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of the network information technology and Internet, at the same time, in order to ensure the security and confidentiality of the information, identity authentication technology becomes more and more important. In other words, for any systems which need permissions to access, identity authentication process is necessary, in this way, each of such system need the same identity authentication process, of course, there exists the problem of resource wastes.In view of the current situation in present, this paper proposes an identity authentication service based on cloud service, which will make identity authentication as a service, so it not only solves the problem of resource wastes, in the meanwhile, it can ensure the security of the information. However, as a SaaS service, access control problems appear in the process of design and implementation, the traditional RBAC model is not suitable for SaaS systems, so in order to ensure generality and safety of identity authentication service system based on cloud service which proposed by this paper, this paper proposes an improved RBAC model, and then realize it, which solves access control problems met in this system.This paper first introduces the common identity authentication technology, on the basis of the research of SAML, Liberty and LDAP directory service technology and so on, it puts forward an implementation plan which is suitable for this topic. Based on the implementation plan, the overall architecture of this system is presented and a detailed research and design of the system architecture is carried out, and also this paper makes a detailed research and design in the system modules. According to the access control problems met in the implantation of this system, it proposes a solution, and then realizes it. Finally it deploys this system in the server to test and verify the performance of the system.
Keywords/Search Tags:cloud service, cloud platform, software as a service, security assertion markup language, identity authentication, Liberty
PDF Full Text Request
Related items