attackers. In the cloud computing core technologies
identified vulnerabilities are mainly related to the
virtual machine escape, poor password protection,
poor authentication and authorization systems,
session hijacking, and insecure cryptographic
algorithms. The presented work in this paper can be
considered as an attempt to remove some of these
vulnerabilities that are related to the user
authentication and authorization.
Authentication and authorization of the
OpenStack and VMware platforms were carefully
studied before a solution enabling a federated IdM
approach to be applied in cloud computing
environment emerged. The developed solution, the
Common Authentication Solution connects both
platforms and enables secure authentication service
and friendly remote user management. CAS has been
implemented for integrating the user authentication of
the addressed platforms, but it is sufficiently general
to be used for other environment as well. The
Microsoft cloud solution already offers some options.
A SOAP library (Ruby library), for example, can be
used to use the functionality in Windows Remote
Management (WinRM) to call native object in
Windows. This includes, but is not limited to, running
batch scripts, powershell scripts and fetching WMI
variables. This way, we can communicate and map
users between CAS and the Hyper-V cloud. Another
popular open source cloud platform OpenNebula
contains a patch in the authentication system, and two
standard SimpleSAMLphp modules that can be used
to establish connection between CAS and
OpenNebula. Furthermore, Eucalyptus and
CloudStack are still missing the SAML support in
their authentication system, but their aim is to
integrate the SSO SAML support. Despite the lack of
SAML support there can be a patch developed to
support this feature. It is necessary to reiterate at this
point that our aim was to provide a unified interface
for many other well-known cloud providers and
provide simple integration of our platform with other
IaaS platforms.
Acting as a kind of a broker, CAS introduces only
a slight overhead (login to CAS) to the multi-platform
cloud operation from the user point of view when
only one platform is accessed. On the other hand CAS
relieves the user from frustration of having to
remember multiple passwords and enables him easier
access to multiple cloud platforms. CAS functionality
improves administration performance by providing
one interface to manage multiple cloud platforms.
The amount of time spent for logging on to different
cloud platforms is reduced and it provides faster
access to the resources.
Cloud computing still needs much more
development and deployment for provision of secure
and trustworthy services. The future development is
planned to be oriented towards provision of a unified
access point for many other well-known cloud
providers such as Amazon, DigitalOcean, Slicehost,
or Rackspace. For this reason, our future work is
oriented to the extension of the functionality of the
CAS system in order to support other features that are
common to different cloud providers and platforms,
such as management of a cloud network, virtual
machine, image and storage.
REFERENCES
Abdo, J. B., Demerjian, J., Chaouchi, H., Barbar, K., &
Pujolle, G. (2013). Broker-Based Cross-Cloud
Federation Manager. In Internet Technology and
Secured Transactions (ICITST), 2013 8th International
Conference for (pp. 244-251). IEEE.
Andronache I., Nisipasiu C., 2011. Web single sign-on
implementation using the simpleSAMLphp
application. Journal of Mobile, Embedded and
Distributed Systems. 3(1):21-9.
Cantor S., Kemp I.J., Philpott N.R., Maler E., 2005.
Assertions and protocols for the oasis security assertion
markup language. OASIS Standard.
Cigoj P., 2014. Cloud computing security and identity
management in the OpenStack platform. Ljubljana:
Jožef Stefan International Postgraduate School.
Cruz Zapata, B., Fernández-Alemán, J.L., & Toval, A.
(2014). Security in Cloud Computing: a Mapping
Study. Computer Science and Information Systems
12(1):161–184.
Ferg B., Fitzpatrick B., Howells C., Recordon D., Hardt D.,
Reed D., et al. 2007. OpenID authentication 2.0.
Fernandes, D.A.B., Soares, L.F.B, Gomes, J.V., Freire,
M.M., & Inácio, P.R.M., 2014. Security issues in cloud
environments: a survey. International Journal of
Information Security, vol. 13, iss. 2, pp. 113-170.
Ferraiolo D.F., Sandhu R., Gavrila S., Kuhn D.R.,
Chandramouli R., 2001. Proposed NIST standard for
role-based access control. ACM Transactions on
Information and System Security (TISSEC). 4(3):224-
74.
Group TO, 2014. Single Sign On. Available from:
http://www.opengroup.org/security/sso/.
Grozev, N., & Buyya, R. (2014). InterCloud architectures
and application brokering: taxonomy and survey.
Software: Practice and Experience, 44(3), 369-390.
Jansen, W., Grance, T., 2011. Guidelines on security and
privacy in public cloud computing. NIST special
publication. 800:144.
Lonea A.M., Tianfield H., Popescu D.E., 2003. Identity
management for cloud computing. New Concepts and
Applications in Soft Computing: Springer. 175-99.
AnApproachintheDesignofCommonAuthenticationSolutionforaMulti-PlatformCloudEnvironment
371