Tez özetleri Astronomi ve Uzay Bilimleri Anabilim Dalı


Authentication and Authorization in Cloud Computing Services



Yüklə 1,69 Mb.
səhifə172/258
tarix07.01.2022
ölçüsü1,69 Mb.
#87518
1   ...   168   169   170   171   172   173   174   175   ...   258
Authentication and Authorization in Cloud Computing Services
With the development of broadband Internet, the number of web-based applications is increasing every day. New high quality mobile devices are being produced every day and people have large data storage needs. To achieve this, central storage systems have been installed. In this way, data and services that people receive, will be supplied by very powerful servers. This kind of work is done with the concept that we call "Cloud Computing". Basically, Cloud Computing is defined to be the cooperation of the cloud (on the internet somewhere) which is a server and any device or tool that can run applications and services of this server.
With Cloud Computing, your computer (or mobile device) can share the pictures, music, video, office applications, archiving, calendar, language converter programs and all your personal files on a cloud server via internet. In this way, if you are connected to the Internet from anywhere, any computer or mobile device, you can find your data and programs. To give an example of cloud computing applications and services, Google Mail, Apple iCloud, Ubuntu One, Google Docs, Microsoft SkyDive, Picasa, Flickr, and so on can be shown. They are all web-based applications and all services are running over cloud computing.
Cloud Computing is a very important step for the future, but it may also hae some problems in for us. Data security, system performance and the need for stability are standards that should be assured. With the increase of the users that use smart mobile decives, the cloud security topics become of a high interest. Many topics are part of the Security, but we will concentrate on authentication and authorization from a mobile client to a cloud environment.
The purpose of this work intends accomplishing the user authentication via help of mobile signiture. Because that the designed structure is modular, it can be integrated with any other system. The designed token mechanism plays an important role in restricting every user to be able to use the services only by specified roles. In this way, the service running on cloud is able to set roles for each user and make restrictions. As a result of this designed infrastructure, a sample mobile application is developed. This application can be used in a university environment where students and teachers are the end users.


Yüklə 1,69 Mb.

Dostları ilə paylaş:
1   ...   168   169   170   171   172   173   174   175   ...   258




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin