Managing Identity and Authorization for Community Clouds
نویسندگان
چکیده
A community cloud operates to serve multiple organizations who have entered into sharing arrangements with one or more cloud providers. Members of the participating organizations may also collaborate on shared projects, which may lead them to exercise shared control over virtual machines or other cloud-hosted resource instances. Software running in the cloud instances may serve the community members or act on their behalf. For these reasons a flexible framework for identity and authorization is essential for community clouds. This paper gives an overview of the trust framework adopted in NSF’s GENI project, which may be viewed as a multi-provider infrastructure cloud serving a community of researchers with various institutional and project affiliations. The authorization framework for GENI combines elements of existing solutions to related challenges: Web-based Single-Sign On and federated identity management (e.g., Shibboleth), virtual organizations in grid computing, access control based on roles or attributes, and public key cryptosystems with delegated trust and proxy certificates. The GENI solution uses a form of Attribute-Based Access Control (ABAC) incorporating a trust management logic and authorization policy language called Role-based Trust (RT).
منابع مشابه
An Innovative Workspace for The Cherenkov Telescope Array
The Cherenkov Telescope Array (CTA) is an initiative to build the next generation, ground-based gamma-ray observatories. We present a prototype workspace developed at INAF that aims at providing innovative solutions for the CTA community. The workspace leverages open source technologies providing web access to a set of tools widely used by the CTA community. Two different user interaction model...
متن کاملMulti-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth
The services provided in clouds may represent an increase in the efficiency and effectiveness in the operations of the enterprise business, improving the cost-effectiveness related to services and resources consumption. However, there is concern about the privacy of data, since such data are outside the client’s domain. For these services to be effectively enjoyed by organizations it is necessa...
متن کاملTowards Business Driven Web Service Authorization - Project Experiences in German University Administrations
The management of web service access is a great challenge primarily in organizations with a high number of web services and various sorts of access authorization. Both organizational and technical hurdles have to be overcome. Technical barriers arise by different security requirements across various systems under consideration of economic conditions. Complex service interaction may be mentioned...
متن کاملIDfusion An Open-Architecture for Kerberos based Authorization
Since its initial development Kerberos has evolved to become the widely accepted system for implementing centralized authentication services. During this time the Lightweight Directory Access Protocol (LDAP) has become the accepted method for the centralized distribution of identity information. Organizations increasingly deploy both infra-structural components in order to support management of...
متن کاملVirtual Communities of Agents in Peer to Peer Systems: Distinguishing Permission and Authorization in Access Policies
We are interested in the design of policies for managing access to resources in virtual communities based on the peer to peer systems. In a virtual community members can play both the role of resource consumers and the role of resource providers, and they remain in control of their resources. We argue that this requirement imposes a new distinction between the authorization to access a resource...
متن کامل