透過您的圖書館登入
IP:3.136.22.50
  • 期刊

雲端個人身分鑑別的改善

Improve User Authentication in Cloud Computing

摘要


雲端運算讓用戶能隨時隨地以各種上網裝置透過網路動態地使用雲端無限的資源,大幅降低系統建置維運的時間與成本。將用戶使用的應用軟體與敏感性資料由自己掌控的封閉環境移往開放式的雲端,產生了許多新的安全與隱私顧慮。本論文詳細分析目前最廣為使用的雲端單一登入機制OAuth,探討開發者架設網站上容易產生的安全問題並提出改善方法,希望藉此讓使用者對雲端的身分鑑別有更清楚的了解,也增加對雲端服務的信心。

並列摘要


Cloud computing is a way to let users dynamically access unlimited resources anytime anywhere through Internet using various Internet-enabled devices. The cost and time of system implementation and maintenance can thus be reduced, the risk can be lowered. Moving user’s applications and sensitive data of individual users/enterprise users from closed environments to open cloud environments raises many new concerns about security and privacy. This paper analyzes the problems of the mostly widely used single sign-on mechanisms - OAuth, and then proposes solutions to improve the above-mentioned problems. Hope that the risks of user authentication in cloud computing should be understood in more detail, and the users’ confidence in adopting cloud services can thus be increased.

並列關鍵字

Cloud computing Authentication Single Sign-On OAuth

參考文獻


Hardt, D. (2012). The OAuth 2.0 authorization framework. Retrieved Apr. 7, 2015, from http://tools.ietf.org/html/rfc6749.html
Gibbons, K., Raw, J. O., & Curran, K. (2014). Security evaluation of the OAuth 2.0 framework. Information Management & Computer Security, 22(3), 1-8.
Hammer-Lahav, E. (2010). The OAuth 1.0 protocol. Retrieved Apr. 7, 2015, from https://tools.ietf.org/html/rfc5849
Hunt, P., Richer J., Mills W., & Mishra P. (2015). OAuth 2.0 proof-of-possession (PoP) security architecture. Retrieved Mar. 9, 2016, from https://datatracker.ietf.org/doc/draft-ietf-oauth-pop-architecture/
Lodderstedt, T., McGloin, M., & Hunt, P. (2013). OAuth 2.0 threat model and security considerations, Retrieved Apr. 7, 2015, from https://tools.ietf.org/html/rfc6819

延伸閱讀