Contents & References of Improving information security in cloud computing using the SAML standard
List:
Abstract .. 1
Chapter One: Introduction
1-1 Introduction .. 3
1-2 Definition of the problem .. 4
1-3 Explanation of the problem .. 5
1-4 Thesis structure .. 5
Chapter Two: Cloud computing, challenges and Solutions
2-1 Introduction .. 7
2-2 History of cloud computing .. 7
2-3 Some examples .. 8
2-3-1 Multiplex .. 8
2-3-2 Early virtual machine supervisors. 8
2-3-3 National CSS Company .. 9
2-4 concepts .. 9
2-4-1 definition of cloud computing .. 9
2-4-2 main characteristics of cloud computing . 11
2-5 Cloud architecture and components.. 12
2-5-1 General view of existing ideas for cloud structures and its components. 12
2-5-2 cloud computing service models. 12
2-6 Classification of clouds .. 15
2-7 Multi-tenancy .. 16
2-8 Virtualization. . 16
2-9 Cloud Shapes .. 17
Eight
2-9-1 Dimension one: internal/external. 17
2-9-2 dimension two: dedicated/open .. 17
2-9-3 dimension three: environmental/non-environmental. 18
2-9-4 dimension four: outsourcing/insourcing. 18
2-10 opportunities and challenges of cloud computing. 18
2-11 Security challenges of cloud computing. 19
2-12 Cloud computing privacy challenges. 19
2-13 data protection.. 20
2-14 data protection solutions. 20
2-15 common risks of information security in the cloud. 20
2-15-1 Phishing .. 20
2-15-2 Right of access of provider personnel. 21
2-16 Applications and limitations of data encryption. 21
2-17 Data authentication and user identification. 21
2-18 storing data in the cloud .. 22
2-19 authentication .. 22
2-20 security proof markup language. 23
2-20-1 Definition .. 23
2-20-2 Features .. 24
2-20-3 Components .. 25
2-21 Security Proof Markup Language in Web Services Security. 29
2-22 Issuance of security proof markup language token in web services. 34
2-23 Conclusion .. 35
The third chapter: review and analysis of the work done
3-1 Introduction. . 37
3-2 Single sign-on systems .. 37
No
3-2-1 Enterprise .. 37
3-2-2 Complex (federated) .. 38
3-3 Single sign-on methods .. 38
3-4 Kerberos method .. 46
3-4-1 Kerberos Protocol .. 46
3-4-2 Kerberos Advantages .. 48
3-4-3 Kerberos Disadvantages .. 48
3-5 Web Single Sign-On Authentication Using Security Proof Markup Language. 49
3-6 Security Web Services .. 53
3-7 Integrated Authentication .. 53
3-8 Integrated Web Services .. 54
3-9 Security Proof Markup Language and Integrated Web Services. 55
3-10 Second version of Security Assertion Markup Language (SAML 2). 56
3-11 complex authentication.. 56
3-12 Advantages of single login authentication. 56
3-13 Advantages of security proof markup language. 57
3-14 Common errors in security proof markup language. 57
3-15 Security proof markup language as a secure cloud standard. 57
3-16 Conclusion .. 61
Chapter Four: Single Sign On Using Security Proof Markup Language
4-1 Introduction .. 63
4-2 Proposed Model for Security Proof Markup Language Authentication in Web Single Sign On. 63
4-3 steps of doing the work of the proposed model. . 64
4-4 simulation of the proposed model... 68
4-5 data security model in cloud computing. 68
4-5 Conclusion .. 72
Ten
Chapter Five: Examination of the proposed model and conclusion
5-1 Introduction .. 73
5-2 Examination of the proposed model in terms of security. 73
5-3 Review and evaluation of the proposed model. 74
5-3-1 Model evaluation method .. 74
5-3-2 Determining the reliability and validity of the questionnaire. 76
5-3-3 Determining the reliability of the questionnaire designed to evaluate the proposed model. 76
5-3-4 Determining the validity of the questionnaire designed to evaluate the proposed model. 77
5-3-5 extraction of factors.. 78
5-4-6 evaluation of the proposed model. 81
5-4-7 Friedman test to compare the means of the methods. 81
5-4-8 test81
5-4-8 Kolmogorov-Smironov test. 82
5-4-9 variance analysis. 82
5-5 advantages and results obtained from the proposed model. 83
5-6 possible problems and suggested solutions. 84
Resources. 85
Appendixes. 87
Source:
[1] Prepared by the Cloud Security Alliance Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, United States Copyright Act, December 2009.
[2] TaheriMonfared A Securing the IaaS Service Model of Cloud Computing Against Compromised Components, Norwegian University of Science and Technology, June 2011.
[3] Kumaz P, Sehgal K, Chauhan S, Gupta K and Diwakar M "Effective Ways of Secure, Private and Trusted Cloud Computing", IJCSI International Journal of Computer Science Issues, Vol 8, Issue 3, No 2, May 2011.
[4] LEWIS D and LEWIS E "Web Single Sign-On Authentication using SAML", IJCSI International Journal of Computer Science Issues, Vol 2, 2009.
[5] Ragouzis N "Security Assertion Markup Language (SAML) V2.0 Technical Overview", Feb. 2007.
[6] Cantor S "Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0", OASIS Standard, 15 March 2005.
[7] Wang J, Zhao Y, Jiang S and Le J "Providing privacy preserving in Cloud computing", International Conference on Test and Measurement, pp 213-216, 2009.
[8] Saltzer H Protection and the control of information sharing in multics, ACM, 17(7):388–402, 1974.
[9] Stanoevska?Slabeva k and Wozniak K, principal cloud,
[10] Chen Y, Paxson V and Katz K "What's New About Cloud Computing Security", Electrical Engineering and Computer Sciences University of California at Berkeley, Technical Report No. UCB/EECS-2010-5, January 20, 2010.
[11] http://www.iranianlearn.com/article6119.html.
[12] http://xen.org/products/xenhyp.html.
[13] Karger P "Securing virtual machine monitors—what is needed", Keynote address, ASIACSS 2009.
[14] Feinleib H A Technical History of National CSS, Computer History Museum, April 2005.
[15] "Cloud Computing Security Considerations", Department of Intelligence and Security of Australian Government, April 2011.
[16] Delgado V Exploring the limits of cloud computing, Master of Science Thesis Stockholm, Sweden, 2010.
[17] Miller M "Using WS-Security and SAML for Internet Single Sign On", 20th Computer Science Seminar, SA3-T4-1, 2005.
[18] J?sang A Security Usability Principles for Vulnerability Analysis and Risk Assessment, Annual Computer Security Applications Conference, 2007 (ACSAC'07).
[19] "Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration", Jericho Forum tm, Version 1.0, April 2009.
[20] Provos N Safe Browsing (Google Online Security Blog), June 2012.
[21] Jansen W and Grance T Guidelines on Security and Privacy in Public Cloud Computing, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD 20899-8930, December 2011.
[22] http://www.schneier.com/blog/archives/2010/06/data_at_rest_vs.html.
[23] Winkler R Cloud Computer Security Techniques and Tactics, in the United States of America, 2011.
[24] "Security Assertion Markup Language (SAML) 2.0", OASIS Standard, July 2005.
[25] Kemp J "Authentication Context for the OASIS Security Assertion Markup Language (SAML) V2.0." OASIS SSTC, January 2005.
[26] "Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0", OASIS Standard, March 2005.
[27] Box D "Simple Object Access Protocol (SOAP) 1.1.", World Wide Web Consortium Note, May 2000.
[28] Meyer C, Feldmann F and Schwenkpaper J "Sometimes it's better to be STUCK", Horst Gortz Institute for IT-Security, Ruhr-University Bochum, 2011.