Download presentation
Presentation is loading. Please wait.
Published byChloe Webb Modified over 9 years ago
1
Authentication & Authorization: Security and Integrity in the Cloud Desmond White Tierre.dw@gmail.com July 3, 2014 1
2
Authorization & Authentication Authorization & Authentication Access rights to resources related to information security applied to computing devices and computer networks. Confirming the identity of the individual attempting to gain access. 2
3
Authentication vs. Authorization Occasionally, both terms are paired so that the server has an idea of who the individual is. Some types authentication required to be authorized are password, proof of identity, digital signature and recorded facial traits. Authentication is the first line of defense while authorization is the second, however, authentication is the most important in open and trusted networks. 3
4
Grid & Cloud Computing Grid computing would be the parent of cloud computing. It is computer resources that are shared with every other computer in the same network or system. Cloud computing is defined as a computer network that in which a server or servers are connected through the internet, local area network or wide area network. 4
5
Authorization in the Grid In Globus toolkit, authorization is accomplished by accessing a grid-mapfile. DN’s that have been authenticated and have been assigned a local account are authorized to use the different resources assigned to the account. Not all resources are given to distinguished users in the grid-mapfile. Further authorization must be implemented in order to gain access. This method is also applied in cloud computing. 5
6
Attribute – based Authorization Push ModePull mode 6
7
Key components Service models A.Software as a Service (SaaS) B.Platform as a Service (Paas) C.Infratructure as a Service (Iaas) Cloud deployment models A.Public B.Community C.Private D.Hybrid 7
8
Further Research Encryption: Relation it has to authentication and authorization. Other authentication methods Authentication Java Program 8
9
References "Understanding Authentication, Authorization, and Encryption." TechWeb RSS. N.p., n.d. Web. 30 June 2014. "Authorization Strategies for Virtualized Environments." Authorization Strategies for Virtualized Environments in Grid Computing Systems ∗ (n.d.): n. pag. Web. "The 4 A's of Cloud Identity: Authentication, Authorization, Account Management & Audit Logging." 4 A's of Cloud Identity. N.p., n.d. Web. 02 July 2014. 9
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.