2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing 2014
DOI: 10.1109/ucc.2014.119
|View full text |Cite
|
Sign up to set email alerts
|

X.509 Authentication and Authorization in Fermi Cloud

Abstract: We present a summary of how X.509 authentication and authorization are used with OpenNebula in FermiCloud. We also describe a history of why the X.509 authentication was needed in FermiCloud, and review X.509 authorization options, both internal and external to OpenNebula. We show how these options can be and have been used to successfully run scientific workflows on federated clouds, which include OpenNebula on FermiCloud and Amazon Web Services as well as other community clouds. We also outline federation op… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…In [13], paper discussed about the approval as well as responsibility of trust model. FermiCloud [14] followed the different protocol for the model but it took longer process of certification. In [15] given the idea, how to manage the cloud complexity with the help of software application.…”
Section: A Authentication and Authorizationmentioning
confidence: 99%
“…In [13], paper discussed about the approval as well as responsibility of trust model. FermiCloud [14] followed the different protocol for the model but it took longer process of certification. In [15] given the idea, how to manage the cloud complexity with the help of software application.…”
Section: A Authentication and Authorizationmentioning
confidence: 99%
“…This study identifies a set of categories relevant for authentication and authorization ex: public key infrastructure(PKI), X.509 certificates for user identification and authentication. As per paper [5] authorization-as-a-service(Aaas) approach can be used for health care. The IBE and IBS schemes are used for integrity maintenance, the idea is based on the identity based authorization for cloud computing along with the corresponding encryption and signature schemes without using certificates.…”
Section: Security Challenges In Cloud Health Carementioning
confidence: 99%
“…Along these lines, confirmation and approval arrangements are decoupled from singular application administrations and appointed to the mutual cloud security framework, which convey these character benefits through SaaS show. Centralization and sharing of those character benefits in a different security framework brings about a successful and adaptable answer for a cloud domain [20]. This approach empowers the whole cloud security framework to be controlled and overseen considerably less demanding, subsequently raising the nature of gave cloud security arrangements.…”
Section: Authentication Plus Authorizationmentioning
confidence: 99%