2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud) 2017
DOI: 10.1109/ficloud.2017.29
|View full text |Cite
|
Sign up to set email alerts
|

A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications

Abstract: Abstract-Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network. It has emerged as the key technology that unleashes the potency of Big Data, Internet of Things, Mobile and Web Applications, and other related technologies; but it also comes with its challenges -such as governance, security, and privacy. This paper is focused on the security and privacy … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0
5

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 43 publications
(24 citation statements)
references
References 14 publications
0
19
0
5
Order By: Relevance
“…The computation/storage resources are outsourced to the cloud in order to perform the expensive authentication process with low latency and limited power consumption. The work in [36] propounded a user authentication and management framework for cloud SaaS application that harnesses the stateless and secure nature of Jason Web Token (JWT) for client authentication and session management. Dsouza et al [37] proposed a policy-driven security management approach for fog resources including policy analysis and its integration with fog paradigm.…”
Section: Related Workmentioning
confidence: 99%
“…The computation/storage resources are outsourced to the cloud in order to perform the expensive authentication process with low latency and limited power consumption. The work in [36] propounded a user authentication and management framework for cloud SaaS application that harnesses the stateless and secure nature of Jason Web Token (JWT) for client authentication and session management. Dsouza et al [37] proposed a policy-driven security management approach for fog resources including policy analysis and its integration with fog paradigm.…”
Section: Related Workmentioning
confidence: 99%
“…Para garantir a integridade dos dados no servidor, evitando que algum estudante com conhecimento em programação possa realizar um processo de engenharia reversa e modifique o comportamento do aplicativo enviando dados inválidos ou alterando notas no webservice, foi adotado como autenticação o modelo JWT. Ethelbert et al (2017) descreve Json Web Token (JWT) como uma estrutura de um token padronizado em três partes (Header, Payload e Signature) de informações armazenadas no formato JSON e compactadas em codificação de Base64. Através desse token é possível armazenar dados de identificação do solicitante, assim como garantir a que os dados do token não foram alterados de forma maliciosa.…”
Section: Desenvolvimento Do Aplicativounclassified
“…We use cryptography to solve most security problems in cloud computing. Key management [6][7][8] is a very important part of cloud computing. There are many challenges in terms of generating, managing, and distributing keys.…”
Section: Introductionmentioning
confidence: 99%