Font Size: a A A

The Unified Identity Authentication Technology Research Based On Cloud Computing

Posted on:2015-01-30Degree:MasterType:Thesis
Country:ChinaCandidate:L G ShiFull Text:PDF
GTID:2298330467472415Subject:Information security
Abstract/Summary:PDF Full Text Request
With the development of cloud computing, the cloud service providers become more and more.In order to achieve access to cloud resources, users need to remember lots of passwords andmultiple authentication. But a larger number of repeated password may bring huge security risk. Inaddition, it is a great trouble for cloud services providers to create multiple databases.Based on the above consideration, we need to design a safe and reliable unified authenticationscheme. In this paper, identity authentication technology of cloud computing is studied in depth. Onthe basis of a detailed study of SAML, the paper focuses on the fundamental comparison betweenthe two kinds of single sign-on model grounded on SAML, then respectively analyzes DNSattacks、replay attacks and DoS attacks on SAML unified authentication model in detail. Based onthese shortcomings of SAML, this paper adopts challenge/response mechanism in the user loginauthentication and uses XML Signature and Encryption on SAML message. Moreover, SAMLassertions are extended in which two safe elements are added, thus ensuring the safety of the wholeprocess of unified authentication.According to the security scheme and information security mechanism put forward, the paperdesigns a unified authentication system of cloud computing detailedly, using these securityprocessing technology that provides security supports for the unified identity authenticationproposed. In allusion to the system model proposed in this paper, every component module isdescribed and analyzed in detail. Finally, the paper demonstrates the implementation of unifiedidentity authentication system through a typical application example of cloud computing andanalyze the system security, thus proving the feasibility and security of the system proposed.
Keywords/Search Tags:Cloud Computing, the security of cloud computing, unified identity authentication, single sign-on, SAML
PDF Full Text Request
Related items