SlideShare a Scribd company logo
1 of 10
Download to read offline
AUTHENTICATION IN THE 
CLOUD 
Are we really safe in the cloud?
OUTLINE 
1. Problem definition 
2. Businesses and cloud 
3. Cloud models and Issues 
3. The difference 
3. Authentication issues
SECURITY PROBLEM SELECTED 
The security problem that G Force has selected is the 
authentication of different devices and users in cloud 
computing. 
This is an important issue all of our employers have in 
common as more companies migrate to cloud computing 
and they need more secure solutions implemented. 
Corporate concerns are: 
 Single point of failure for authentication 
 Data breaches because of weak authentication 
 Security in the cloud is the #1 concern of businesses 
All sectors are migrating to cloud computing because IT 
costs can be cut, it reduces capital expenses, and is a 
viable option to modernize legacy systems.
BUSINESSES AND CLOUD 
 Business requirements: Netflix, Adobe connect, 
Expense reporting, Timesheet, Payroll systems 
 Support customers with multiple devices accessing their 
system 
 Moving existing applications out of the datacenter and 
into virtual private and fully public clouds. 
 Fully embracing virtual datacenters, which means 
consolidating physical datacenters, and (if the 
company’s large enough) forming a private cloud. 
 Outsourcing applications. There’s SaaS applications 
like Workday, ADP, Concur, and SalesForce.com that 
have replaced functions that used to run in the 
datacenter, and then there’s also custom apps for data 
that’s proprietary, sensitive or regulated, which many 
people are running in a platform-as-a-service (PaaS) 
extension.
CLOUD MODELS AND ISSUES 
o Different deployment models: Private, Public, and Hybrid 
o Private: Issue “still have to buy, build, and manage them” 
o Public: No direct connection and control. Amazon, Microsoft and 
Google 
o Hybrid : lack the flexibility, security and certainty of in-house 
applications
THE DIFFERENCE 
 Internal System 
 More secure authentication like LDAP, KERBOES 
 Company has a control over the data and process 
 User management is easy and more controlled 
 Cloud System 
 Proprietary authentication system 
 It is a nightmare to manage the users remotely. We 
wont know what the vendor is doing 
 Migration is very difficult. It is difficult to synchronise 
login and authentication data between external clouds 
and internal systems without exposing internal security 
data.
CLOUD AUTHENTICATION ISSUES 
 Cloud service providers request customers to store their account 
information in the cloud, cloud service providers have the access to 
these information. This presents a privacy issue to the customer’s 
privacy information. 
 Many SLAs have specified the privacy of the sensitive information, 
however, it is difficult for customers to make sure the proper rules are 
enforced. There is a lack of transparency in the cloud that allows the 
customers to monitor their own privacy information. 
 When a customer decide to use multiple cloud service, the customer will 
have to store his/her password in multiple cloud, the more cloud service 
the customer is subscript to, the more copy of the user’s information will 
be. This is a security issue for the customers and the cloud service 
providers. 
 The multiple copies of account will lead to multiple authentication 
processes. For every cloud service, the customer needs to exchange 
his/her authentication information. This redundant actions may lead to an 
exploit of the authentication mechanism. 
 Cloud service providers use different authentication technologies for 
authenticating users, this may have less impact on SaaS than PaaS 
and IaaS, but it is present a challenge to the customers.
AUTHENTICATION ISSUES - CONTD 
 Wells Fargo Customer Data Breached – How Did 
Cyber-Criminals Get The Access Codes? – Why No 
Strong Authentication? 
 Dictionary attack? 
 Security issues in cloud computing has played a 
major role in slowing down its acceptance, in fact 
security ranked first as the greatest challenge issue of 
cloud computing as depicted in the chart.
SURVEY ON CLOUD COMPUTING
REFERENCES 
 http://en.wikipedia.org/wiki/Two-factor_ 
authentication 
 http://blog.ironkey.com/?p=437 
 http://cscjournals.org/csc/manuscript/Journals/IJCN 
/volume3/Issue5/IJCN-176.pdf 
 http://en.wikipedia.org/wiki/Cloud_computing#Hybri 
d_cloud 
 http://www.sersc.org/journals/IJMUE/vol7_no3_201 
2/18.pdf 
 http://data-protection.safenet-inc. 
com/2012/05/cloud-computing-migration-from-physical- 
datacenter-to-the-cloud/

More Related Content

What's hot

What's hot (20)

UNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdfUNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdf
 
Unification and Lifting
Unification and LiftingUnification and Lifting
Unification and Lifting
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Domain specific IoT
Domain specific IoTDomain specific IoT
Domain specific IoT
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
IP Security
IP SecurityIP Security
IP Security
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication Protocols
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Common Standards in Cloud Computing
Common Standards in Cloud ComputingCommon Standards in Cloud Computing
Common Standards in Cloud Computing
 
Naive bayesian classification
Naive bayesian classificationNaive bayesian classification
Naive bayesian classification
 
Control Strategies in AI
Control Strategies in AI Control Strategies in AI
Control Strategies in AI
 
Uncertainty in AI
Uncertainty in AIUncertainty in AI
Uncertainty in AI
 
Artificial intelligence- Logic Agents
Artificial intelligence- Logic AgentsArtificial intelligence- Logic Agents
Artificial intelligence- Logic Agents
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected Devices
 
Google App Engine ppt
Google App Engine  pptGoogle App Engine  ppt
Google App Engine ppt
 
Control Strategies in AI
Control Strategies in AIControl Strategies in AI
Control Strategies in AI
 
Ontology engineering
Ontology engineering Ontology engineering
Ontology engineering
 

Viewers also liked

Create a Uniform Login Experience with a Centralized Cloud Authentication Sys...
Create a Uniform Login Experience with a Centralized Cloud Authentication Sys...Create a Uniform Login Experience with a Centralized Cloud Authentication Sys...
Create a Uniform Login Experience with a Centralized Cloud Authentication Sys...Xamarin
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Papitha Velumani
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Adz91 Digital Ads Pvt Ltd
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor AuthenticationRonnie Isherwood
 
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using KerberosSingle Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using KerberosDeepak Bagga
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 

Viewers also liked (9)

Create a Uniform Login Experience with a Centralized Cloud Authentication Sys...
Create a Uniform Login Experience with a Centralized Cloud Authentication Sys...Create a Uniform Login Experience with a Centralized Cloud Authentication Sys...
Create a Uniform Login Experience with a Centralized Cloud Authentication Sys...
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
Project
ProjectProject
Project
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor Authentication
 
Process Scheduling
Process SchedulingProcess Scheduling
Process Scheduling
 
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using KerberosSingle Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using Kerberos
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 

Similar to Authentication in cloud computing

SaaS Security.pptx
SaaS Security.pptxSaaS Security.pptx
SaaS Security.pptxchelsi33
 
saassecurity-230424030940-08314322.pdf
saassecurity-230424030940-08314322.pdfsaassecurity-230424030940-08314322.pdf
saassecurity-230424030940-08314322.pdfSahilSingh316535
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDSweta Kumari Barnwal
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computingHossam Zein
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the CloudCloudSmartz
 
Unit 5 - Cloud Computing - www.rgpvnotes.in.pdf
Unit 5 - Cloud Computing - www.rgpvnotes.in.pdfUnit 5 - Cloud Computing - www.rgpvnotes.in.pdf
Unit 5 - Cloud Computing - www.rgpvnotes.in.pdfparasarashok2000
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunalKashyap Kunal
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computingKumayl Rajani
 
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...SafeNet
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing CeleraNetworks
 
Paper id 21201410
Paper id 21201410Paper id 21201410
Paper id 21201410IJRAT
 

Similar to Authentication in cloud computing (20)

Myths About Cloud Computing
Myths About Cloud ComputingMyths About Cloud Computing
Myths About Cloud Computing
 
SaaS Security.pptx
SaaS Security.pptxSaaS Security.pptx
SaaS Security.pptx
 
saassecurity-230424030940-08314322.pdf
saassecurity-230424030940-08314322.pdfsaassecurity-230424030940-08314322.pdf
saassecurity-230424030940-08314322.pdf
 
Cloud monitoring overview
Cloud monitoring overviewCloud monitoring overview
Cloud monitoring overview
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computing
 
Cloud monitoring overview
Cloud monitoring overviewCloud monitoring overview
Cloud monitoring overview
 
Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Business in the cloud
Business in the cloudBusiness in the cloud
Business in the cloud
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
Unit 5 - Cloud Computing - www.rgpvnotes.in.pdf
Unit 5 - Cloud Computing - www.rgpvnotes.in.pdfUnit 5 - Cloud Computing - www.rgpvnotes.in.pdf
Unit 5 - Cloud Computing - www.rgpvnotes.in.pdf
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
 
Paper id 21201410
Paper id 21201410Paper id 21201410
Paper id 21201410
 

Recently uploaded

How to Print Employee Resume in the Odoo 17
How to Print Employee Resume in the Odoo 17How to Print Employee Resume in the Odoo 17
How to Print Employee Resume in the Odoo 17Celine George
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfYu Kanazawa / Osaka University
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxAditiChauhan701637
 
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptx
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptxPractical Research 1: Lesson 8 Writing the Thesis Statement.pptx
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptxKatherine Villaluna
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRATanmoy Mishra
 
Philosophy of Education and Educational Philosophy
Philosophy of Education  and Educational PhilosophyPhilosophy of Education  and Educational Philosophy
Philosophy of Education and Educational PhilosophyShuvankar Madhu
 
Presentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphPresentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphNetziValdelomar1
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfMohonDas
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxDr. Asif Anas
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxiammrhaywood
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxEduSkills OECD
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsEugene Lysak
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17Celine George
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfMohonDas
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice documentXsasf Sfdfasd
 
NOTES OF DRUGS ACTING ON NERVOUS SYSTEM .pdf
NOTES OF DRUGS ACTING ON NERVOUS SYSTEM .pdfNOTES OF DRUGS ACTING ON NERVOUS SYSTEM .pdf
NOTES OF DRUGS ACTING ON NERVOUS SYSTEM .pdfSumit Tiwari
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesMohammad Hassany
 
How to Filter Blank Lines in Odoo 17 Accounting
How to Filter Blank Lines in Odoo 17 AccountingHow to Filter Blank Lines in Odoo 17 Accounting
How to Filter Blank Lines in Odoo 17 AccountingCeline George
 

Recently uploaded (20)

How to Print Employee Resume in the Odoo 17
How to Print Employee Resume in the Odoo 17How to Print Employee Resume in the Odoo 17
How to Print Employee Resume in the Odoo 17
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptx
 
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptx
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptxPractical Research 1: Lesson 8 Writing the Thesis Statement.pptx
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptx
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
 
Finals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quizFinals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quiz
 
Philosophy of Education and Educational Philosophy
Philosophy of Education  and Educational PhilosophyPhilosophy of Education  and Educational Philosophy
Philosophy of Education and Educational Philosophy
 
Presentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphPresentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a Paragraph
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdf
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptx
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George Wells
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdf
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice document
 
NOTES OF DRUGS ACTING ON NERVOUS SYSTEM .pdf
NOTES OF DRUGS ACTING ON NERVOUS SYSTEM .pdfNOTES OF DRUGS ACTING ON NERVOUS SYSTEM .pdf
NOTES OF DRUGS ACTING ON NERVOUS SYSTEM .pdf
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming Classes
 
How to Filter Blank Lines in Odoo 17 Accounting
How to Filter Blank Lines in Odoo 17 AccountingHow to Filter Blank Lines in Odoo 17 Accounting
How to Filter Blank Lines in Odoo 17 Accounting
 

Authentication in cloud computing

  • 1. AUTHENTICATION IN THE CLOUD Are we really safe in the cloud?
  • 2. OUTLINE 1. Problem definition 2. Businesses and cloud 3. Cloud models and Issues 3. The difference 3. Authentication issues
  • 3. SECURITY PROBLEM SELECTED The security problem that G Force has selected is the authentication of different devices and users in cloud computing. This is an important issue all of our employers have in common as more companies migrate to cloud computing and they need more secure solutions implemented. Corporate concerns are:  Single point of failure for authentication  Data breaches because of weak authentication  Security in the cloud is the #1 concern of businesses All sectors are migrating to cloud computing because IT costs can be cut, it reduces capital expenses, and is a viable option to modernize legacy systems.
  • 4. BUSINESSES AND CLOUD  Business requirements: Netflix, Adobe connect, Expense reporting, Timesheet, Payroll systems  Support customers with multiple devices accessing their system  Moving existing applications out of the datacenter and into virtual private and fully public clouds.  Fully embracing virtual datacenters, which means consolidating physical datacenters, and (if the company’s large enough) forming a private cloud.  Outsourcing applications. There’s SaaS applications like Workday, ADP, Concur, and SalesForce.com that have replaced functions that used to run in the datacenter, and then there’s also custom apps for data that’s proprietary, sensitive or regulated, which many people are running in a platform-as-a-service (PaaS) extension.
  • 5. CLOUD MODELS AND ISSUES o Different deployment models: Private, Public, and Hybrid o Private: Issue “still have to buy, build, and manage them” o Public: No direct connection and control. Amazon, Microsoft and Google o Hybrid : lack the flexibility, security and certainty of in-house applications
  • 6. THE DIFFERENCE  Internal System  More secure authentication like LDAP, KERBOES  Company has a control over the data and process  User management is easy and more controlled  Cloud System  Proprietary authentication system  It is a nightmare to manage the users remotely. We wont know what the vendor is doing  Migration is very difficult. It is difficult to synchronise login and authentication data between external clouds and internal systems without exposing internal security data.
  • 7. CLOUD AUTHENTICATION ISSUES  Cloud service providers request customers to store their account information in the cloud, cloud service providers have the access to these information. This presents a privacy issue to the customer’s privacy information.  Many SLAs have specified the privacy of the sensitive information, however, it is difficult for customers to make sure the proper rules are enforced. There is a lack of transparency in the cloud that allows the customers to monitor their own privacy information.  When a customer decide to use multiple cloud service, the customer will have to store his/her password in multiple cloud, the more cloud service the customer is subscript to, the more copy of the user’s information will be. This is a security issue for the customers and the cloud service providers.  The multiple copies of account will lead to multiple authentication processes. For every cloud service, the customer needs to exchange his/her authentication information. This redundant actions may lead to an exploit of the authentication mechanism.  Cloud service providers use different authentication technologies for authenticating users, this may have less impact on SaaS than PaaS and IaaS, but it is present a challenge to the customers.
  • 8. AUTHENTICATION ISSUES - CONTD  Wells Fargo Customer Data Breached – How Did Cyber-Criminals Get The Access Codes? – Why No Strong Authentication?  Dictionary attack?  Security issues in cloud computing has played a major role in slowing down its acceptance, in fact security ranked first as the greatest challenge issue of cloud computing as depicted in the chart.
  • 9. SURVEY ON CLOUD COMPUTING
  • 10. REFERENCES  http://en.wikipedia.org/wiki/Two-factor_ authentication  http://blog.ironkey.com/?p=437  http://cscjournals.org/csc/manuscript/Journals/IJCN /volume3/Issue5/IJCN-176.pdf  http://en.wikipedia.org/wiki/Cloud_computing#Hybri d_cloud  http://www.sersc.org/journals/IJMUE/vol7_no3_201 2/18.pdf  http://data-protection.safenet-inc. com/2012/05/cloud-computing-migration-from-physical- datacenter-to-the-cloud/