Information Technology Reference
In-Depth Information
2 Theoretical Background and Related Work
This section sets forth the paper's theoretical fundamentals as well as related
work in the field of cloud-based authentication services.
2.1 Cloud Computing
Accordingtothe National Institute of Standards and Technology (NIST), Cloud
Computing is defined as a “model for enabling convenient on-demand network
access to a shared pool of configurable computing resources [...] that can be
rapidly provisioned and released with minimal management effort or service
provider interaction” [15]. Cloud services refer to resources at the infrastructure,
platform or application layer and provide specific advantageous characteristics
such as multi-tenancy, easy standardized access through thin clients, scalability
of the underlying infrastructure, and automated self-service provisioning [11,
14, 15]. Hence, the most frequently mentioned obstacles are concerns regarding
security and compliance, but also issues related to the ease of integration with
existing systems and possible lock-in effects [11, 14].
2.2 Authentication
Users can generally be authenticated using knowledge-based, token-based or bio-
metric methods [12]. Most systems implement basic PIN- or password-based
mechanisms (knowledge) [4]. However, because of several inherent drawbacks,
the strength of authentication of knowledge-based mechanisms is considered to
be insucient for many applications [5, 18]. A possible way to increase this
strength is to replace or to supplement existing controls with token-based proce-
dures (e.g. one-time password (OTP) generators) or biometric methods (e.g. face
recognition, keystroke dynamics) [4, 8, 12]. The combination of different kinds
of authentication methods is referred to as multi-factor authentication [4, 12].
2.3 Authentication as a Service
The application of security services according to the Cloud Computing model is
referred to as Security as a Service , SECaaS) and, accordingly, promises addi-
tional specific benefits compared to on-premises solutions or traditional security
service outsourcing [1, 9, 17]. A study conducted by the author in 2011 1 discov-
ered that statistically, there are three drivers for the adoption of SECaaS:
- Perceived Ease of Adoption: Degree to which the adopter believes that
the SECaaS adoption is effortless, both technically and organizationally
speaking;
1 Survey was conducted in 2011 in cooperation with the German Federal Association
for Information Technology, Telecommunications and New Media (BITKOM e.V.,
see: http://www.bitkom.de ) ; detailed data is not published, yet.
 
Search WWH ::




Custom Search