Invention Grant
- Patent Title: Authentication and authorization methods for cloud computing security
- Patent Title (中): 云计算安全的认证和授权方法
-
Application No.: US13173563Application Date: 2011-06-30
-
Publication No.: US08769622B2Publication Date: 2014-07-01
- Inventor: David Yu Chang , Messaoud Benantar , John Yow-Chun Chang , Vishwanath Venkataramappa
- Applicant: David Yu Chang , Messaoud Benantar , John Yow-Chun Chang , Vishwanath Venkataramappa
- Applicant Address: US NY Armonk
- Assignee: International Business Machines Corporation
- Current Assignee: International Business Machines Corporation
- Current Assignee Address: US NY Armonk
- Agent Jeffrey S. LaBaw; David H. Judson
- Main IPC: H04L9/08
- IPC: H04L9/08

Abstract:
An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group (e.g., processors, storage, and memory) for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application. The cloud environment administrator, however, typically is not registered (as a permitted user) within the customer's security module; thus, the cloud environment administrator is not able to access (or release to others, or to the cloud's general resource pool) the resources assigned to the cloud customer (even though the administrator itself assigned those resources) or the associated business information. To further balance the rights of the various parties, a third party notary service protects the privacy and the access right of the customer when its application and information are deployed in the cloud.
Public/Granted literature
- US20130007845A1 Authentication and authorization methods for cloud computing security platform Public/Granted day:2013-01-03
Information query