An authentication model for cloud computing application

العناوين الأخرى

نموذج للتحقق في تطبيقات حوسبة السحابة

مقدم أطروحة جامعية

al-Khashshab, Rafal Adib

مشرف أطروحة جامعية

al-Hamami, Ala H.

أعضاء اللجنة

al-Awdat, Ahmad M.
Samawi, Venus W.

الجامعة

جامعة عمان العربية

الكلية

كلية العلوم الحاسوبية و المعلوماتية

القسم الأكاديمي

قسم علم الحاسوب

دولة الجامعة

الأردن

الدرجة العلمية

ماجستير

تاريخ الدرجة العلمية

2013

الملخص الإنجليزي

Recently cloud computing is considered the next generation in world of the internet.

The word cloud computing means different things to different people, but there is a common definition used by people as the away to deliver service and data rather than as a product, the data owners can remotely store and access their data in the cloud anytime and anywhere.

The concept of cloud computing is a model for sharing resources like serves, storage, network, and application, Cloud computing made service available for customer in open environment.

Thus, it is important to provide authentication to communicate through cloud.

Cloud users feeling that their data will be secured and available to them.

In this study, the researcher designed successful implementation of cloud authentication; when the users used the internet and before any communication across a network they need to be authenticated with the cloud.

A third party is responsible to check if the user is authorized or not, after that, it gives identification to the user for safety access to the cloud.

In this thesis, the researcher used multiple password mechanism by generating new password every log-in instead of using single password.

In other words, they generated multiple passwords from one password to provide more security for the user, application, and cloud.

The proposed model has been implemented on the personal cloud due to its basic structure for the other clouds deployment

التخصصات الرئيسية

الرياضيات

الموضوعات

عدد الصفحات

94

قائمة المحتويات

Table of contents.

Abstract.

Abstract in Arabic.

Chapter One : Introduction.

Chapter Two : Literature review.

Chapter Three : Theoretical design.

Chapter Four : The experimental works.

Chapter Five : Conclusion and future work.

References.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

al-Khashshab, Rafal Adib. (2013). An authentication model for cloud computing application. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-561992

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

al-Khashshab, Rafal Adib. An authentication model for cloud computing application. (Master's theses Theses and Dissertations Master). Amman Arab University. (2013).
https://search.emarefa.net/detail/BIM-561992

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

al-Khashshab, Rafal Adib. (2013). An authentication model for cloud computing application. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-561992

لغة النص

الإنجليزية

نوع البيانات

رسائل جامعية

رقم السجل

BIM-561992