Secure Cross Single Sign (SSO) on using eIDs Seminar Report

                                            CHAPTER I

Cloud computing is a promising computing paradigm which recently has drawn
extensive attention. Several trends are opening up the era of Cloud Computing, which is an
Internet-based development and use of computer technology. A brief introduction to cloud
computing, with its characteristics, service models and Secure identity across borders linked
(STORK) and Single Sign On (SSO). is given in the following chapter.

1.1 Cloud Computing

Cloud computing is a recently evolved computing terminology or metaphor based
on utility and consumption of computing resources. Cloud computing involves deploying
groups of remote servers and software networks that allow centralized data storage and online
access to computer services or resources. Cloud computing, or in simpler shorthand just "the
cloud", also focuses on maximizing the effectiveness of the shared resources. Cloud
resources are usually not only shared by multiple users but are also dynamically reallocated
per demand. This can work for allocating resources to users. For example, a cloud computer
facility that serves European users during European business hours with a specific application
(e.g., email) may reallocate the same resources to serve North American users during North
America's business hours with a different application (e.g., a web server).
Cloud computing is one of the fastest emerging IT topicstoday. Its high scalability
provision and its enormous costsavings potentials offers a lot of advantages and benefits
tocloud consumers. This makes cloud computing interesting an beneficial to be applied in
various sectors. Moreover, thismeans that also more safety-critical sectors such as
governmentor health start to jump on the cloud computing bandwagon.
This approach should maximize the use of computing power thus reducing
environmental damage as well since less power, air conditioning, rack space, etc. are required
for a variety of functions. With cloud computing, multiple users can access a single server to
retrieve and update their data without purchasing licenses for different applications.[1]
Proponents claim that cloud computing allows companies to avoid upfront infrastructure
costs, and focus on projects that differentiate their businesses instead of on
infrastructure.Proponents also claim that cloud computing allows enterprises to get their

                                                       CHAPTER IV

The STORK framework allows for secure and reliable authentication of European
citizens at service providers. It supports a variety of national eiD solutions.
Furthermore, the
STORK protocol is SAML-based. SAML is also used and implemented by several cloud
service providers for enabling and supporting external identification and authentication to
SaaS applications. The great support of multiple high assurance credentials based on eIDs
and the use of SAML were the reasons for taking the STORK architecture as a basis for our
cross-cloud SSO solution. The support of eIDs guarantees stronger authentication and a
higher level of assurance. The use of SAML enables the possibility for cloud authentication
and the support of single sign-on.
The STORK framework supports several interfaces for connecting to and accessing
diverse national eTD solutions. One interface is based on the STORK protocol itself; other
interfaces support national authentication protocols for service providers. Those national
authentication protocols need not necessarily speak SAML. Currently, simple national
specific web-based and
web service-based authentication protocols are supported. The
STORK framework has been designed in a modular way; hence new authentication protocols
for service providers can be easily added. This gives us the possibility to interconnect and
link the STORK framework also with cloud service providers.
Many cloud service providers use their own identity and user management for
protecting their SaaS applications.
However, some of them provide interfaces supporting
external identity providers for user identification and authentication. These interfaces are
typically based on well-established protocols and standards, which have been currently
widely used in the identity management landscape.

For Get Full Report Mail Us At

No comments:

Post a Comment