
Best Practices in Designing and Implementing Cloud Authentication Schemes
Author(s) -
Zhihao Zheng,
Yao Zhang,
Vinay Gurram,
Jose Salazar Useche,
Isabella Roth,
Yi Hu
Publication year - 2021
Publication title -
computer science and information technology ( cs and it )
Language(s) - English
Resource type - Conference proceedings
DOI - 10.5121/csit.2021.110307
Subject(s) - cloud computing , lightweight directory access protocol , computer science , cloud computing security , authentication (law) , computer security , identity management , cloud testing , directory , operating system
At present, the development and innovation in any business/engineering field are inseparable from the computer and network infrastructure that supports the core business. The world has been turning into an era of rapid development of information technology. Every year, there are more individuals and companies that start using cloud storages and other cloud services for computing and information storage. Therefore, the security of sensitive information in cloud becomes a very important challenge that needs to be addressed. The cloud authentication is a special form of authentication for today’s enterprise IT infrastructure. Cloud applications communicate with the LDAP server which could be an on-premises directory server or an identity management service running on cloud. Due to the complex nature of cloud authentication, an effective and fast authentication scheme is required for successful cloud applications. In this study, we designed several cloud authorization schemes to integrate an onpremises or cloud-based directory service with a cloud application. We also discussed the pros and cons of different approaches to illustrate the best practices on this topic.