A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications
Title | A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Ethelbert, O., Moghaddam, F. F., Wieder, P., Yahyapour, R. |
Conference Name | 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud) |
Publisher | IEEE |
ISBN Number | 978-1-5386-2074-8 |
Keywords | access management, authentication, authorisation, Authorization, authorized access, Big Data, big data security in the cloud, client authentication, cloud computing, cloud resource security, cloud SaaS applications, Collaboration, computing industry, data privacy, Databases, Internet, Internet of Things, IT resources sharing, JSON token-based authentication, JSON Web Token (JWT), Logic gates, Mobile Application, mobile computing, PAM component, PMG component, policy, Policy Activity Monitor component, Policy Based Governance, Policy Match Gate component, Policy Proxy DB, Policy Validation Unit, policy-based governance, PPDB, protected cloud SaaS resources, pubcrawl, PVU, security, Servers, session management, user authentication, Web applications |
Abstract | Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network. It has emerged as the key technology that unleashes the potency of Big Data, Internet of Things, Mobile and Web Applications, and other related technologies; but it also comes with its challenges - such as governance, security, and privacy. This paper is focused on the security and privacy challenges of cloud computing with specific reference to user authentication and access management for cloud SaaS applications. The suggested model uses a framework that harnesses the stateless and secure nature of JWT for client authentication and session management. Furthermore, authorized access to protected cloud SaaS resources have been efficiently managed. Accordingly, a Policy Match Gate (PMG) component and a Policy Activity Monitor (PAM) component have been introduced. In addition, other subcomponents such as a Policy Validation Unit (PVU) and a Policy Proxy DB (PPDB) have also been established for optimized service delivery. A theoretical analysis of the proposed model portrays a system that is secure, lightweight and highly scalable for improved cloud resource security and management. |
URL | http://ieeexplore.ieee.org/document/8114462/ |
DOI | 10.1109/FiCloud.2017.29 |
Citation Key | ethelbert_json_2017 |
- policy-based governance
- Mobile Application
- mobile computing
- PAM component
- PMG component
- Policy
- Policy Activity Monitor component
- Policy Based Governance
- Policy Match Gate component
- Policy Proxy DB
- Policy Validation Unit
- Logic gates
- PPDB
- protected cloud SaaS resources
- pubcrawl
- PVU
- security
- Servers
- session management
- user authentication
- web applications
- cloud SaaS applications
- authentication
- authorisation
- authorization
- authorized access
- Big Data
- big data security in the cloud
- client authentication
- Cloud Computing
- cloud resource security
- access management
- collaboration
- computing industry
- data privacy
- Databases
- internet
- Internet of Things
- IT resources sharing
- JSON token-based authentication
- JSON Web Token (JWT)