An authentication model for cloud computing application

Other Title(s)

نموذج للتحقق في تطبيقات حوسبة السحابة

Dissertant

al-Khashshab, Rafal Adib

Thesis advisor

al-Hamami, Ala H.

Comitee Members

al-Awdat, Ahmad M.
Samawi, Venus W.

University

Amman Arab University

Faculty

Collage of Computer Sciences and Informatics

Department

Department of Computer Science

University Country

Jordan

Degree

Master

Degree Date

2013

English Abstract

Recently cloud computing is considered the next generation in world of the internet.

The word cloud computing means different things to different people, but there is a common definition used by people as the away to deliver service and data rather than as a product, the data owners can remotely store and access their data in the cloud anytime and anywhere.

The concept of cloud computing is a model for sharing resources like serves, storage, network, and application, Cloud computing made service available for customer in open environment.

Thus, it is important to provide authentication to communicate through cloud.

Cloud users feeling that their data will be secured and available to them.

In this study, the researcher designed successful implementation of cloud authentication; when the users used the internet and before any communication across a network they need to be authenticated with the cloud.

A third party is responsible to check if the user is authorized or not, after that, it gives identification to the user for safety access to the cloud.

In this thesis, the researcher used multiple password mechanism by generating new password every log-in instead of using single password.

In other words, they generated multiple passwords from one password to provide more security for the user, application, and cloud.

The proposed model has been implemented on the personal cloud due to its basic structure for the other clouds deployment

Main Subjects

Mathematics

Topics

No. of Pages

94

Table of Contents

Table of contents.

Abstract.

Abstract in Arabic.

Chapter One : Introduction.

Chapter Two : Literature review.

Chapter Three : Theoretical design.

Chapter Four : The experimental works.

Chapter Five : Conclusion and future work.

References.

American Psychological Association (APA)

al-Khashshab, Rafal Adib. (2013). An authentication model for cloud computing application. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-561992

Modern Language Association (MLA)

al-Khashshab, Rafal Adib. An authentication model for cloud computing application. (Master's theses Theses and Dissertations Master). Amman Arab University. (2013).
https://search.emarefa.net/detail/BIM-561992

American Medical Association (AMA)

al-Khashshab, Rafal Adib. (2013). An authentication model for cloud computing application. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-561992

Language

English

Data Type

Arab Theses

Record ID

BIM-561992