Title
How to Adapt Authentication and Authorization Infrastructure of Applications for the Cloud
Abstract
Migration of existing enterprise applications to the Cloud requires substantial adaptation effort in individual architectural components. Existing work has focused on migrating the application with functional and non-functional aspects. However, none of them has focused so far on the adaptation of security and privacy. In our previous work, Identity-as-a-service (IDaaS) decouples Authentication and Authorization Infrastructure (AAI) from the business logic of the application as a manageable resource for the Cloud provider to control its life cycle. Since IDaaS controls the complete security chain, it can coordinate automated trust negotiation between Cloud services in federated security domains. On the other hand, IDaaS provides identity federation for Cloud users to access multiple service providers on demand but also may preserve user's privacy. In this paper, we continue to model a security topology for the Cloud applications. A security topology describes an abstract layer of AAI's components, requirements, and trust relationship between them. It preserves the provisioning of AAI across different environments for interoperability, portability, and enables a dynamic trust relationship with other services on demand.
Year
DOI
Venue
2017
10.1109/FiCloud.2017.14
2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)
Keywords
Field
DocType
identity as a service,federated identity management,security topology,authentication and authorization infrastructure,dynamic trust establishment,Cloud adaptation
Authentication,Computer security,Computer science,Interoperability,Business logic,Service provider,Provisioning,Software portability,Cloud computing,Negotiation
Conference
ISBN
Citations 
PageRank 
978-1-5386-2075-5
1
0.36
References 
Authors
10
3
Name
Order
Citations
PageRank
Tri Hoang Vo121.40
Woldemar F. Fuhrmann210.36
Klaus Peter Fischer-Hellmann310.70