DAuth-Delegated Authorization Framework for Secured Serverless Cloud Computing

被引:3
作者
Padma, P. [1 ]
Srinivasan, S. [2 ]
机构
[1] Sri Sai Ram Engn Coll, Dept Informat Technol, Chennai, India
[2] RMD Engn Coll, Dept Comp Sci Engn, Kavarapettai, India
关键词
Authentication; Authorization; Identity management; Serverless computing; Security;
D O I
10.1007/s11277-023-10189-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Serverless computing which is known as Function as a service becomes a new form of cloud computing. In recent days it enables the components of cloud applications to run on multiple servers in order to provide various functionalities. However, the performance of such applications depends on various modules including the control mechanism of the application. There is a significant reduction in the response time and the ensuing operating costs as the functions are consumed based on need. The most common authorization standards used in Cloud Computing Services nowadays are Open Authorization (commonly referred to as OAuth), OpenID and Security Assertion Markup language. But, the above identity management mechanisms cause additional security vulnerabilities because of their open nature of identity federation. In order to eliminate such vulnerabilities, we have proposed in this paper a novel access named D-Auth which provides both authentication and authorization for serverless computing by introducing Server based with OTP and token authentication in serverless platform by generating D-Auth Tokens and cross sectional Comparative analysis is done between existing and proposed solution to validate the improvement in the protection of Identity management. It considerably reduces security threads by offloading the Identity management to in-premise servers. It enables the organization to implement their own security policies depending on their requirements.
引用
收藏
页码:1563 / 1583
页数:21
相关论文
共 25 条
  • [1] Anggorojati B., 2017, WIRELESS PERS COMMUN
  • [2] Bairwa A.K., 2021, EGYPT INFORM J
  • [3] Bherde G.P., 2016, INT C AUTOMATIC CONT
  • [4] Eludiora S., 2011, INT J COMMUNICATION
  • [5] Fu C.H., 2013, WIRELESS PERS COMMUN
  • [6] Gonzalez J., 2009, Computers Security
  • [7] Haque M.F., 2017, EFSA J
  • [8] Layers Based Optimal Privacy Preservation of the On-premise Data Supported by the Dual Authentication and Lightweight on Fly Encryption in Cloud Ecosystem
    Hemanth Kumar, N. P.
    Prabhudeva, S.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 121 (03) : 1489 - 1508
  • [9] Indu I., 2017, J NETW COMPUT APPL
  • [10] Indu I., 2018, IDENTITY ACCESS MANA