Introduction:
Cloud Computing is a term that is often bandied about the web
these days and often attributed to different things that -- on the surface --
don't seem to have that much in common. So just what is Cloud Computing? I've
heard it called a service, a platform, and even an operating system. Some even
link it to such concepts as grid computing -- which is a way of taking many
different computers and linking them together to form one very big computer.
In
this cloud computing model the major role has been given to the service
provider the admin person must be there because his authorization signature is
required to provide a service to clients. Since pay was maintained the server side
has concern about security.
The
main challenge addressed in this paper is the verification of role-based
authorization chains in decentralized environments, which has not been much
studied in the existing literature. We have presented the RBCD model and its
associated cryptographic operations for convenient verification of delegation
chains
.
RBCD enables a role member to create delegations based on the need of
collaboration; in the meantime anyone can verify a delegation chain without the
participation of role administrators. Our protocol is general and can be
realized by any signature scheme. We have described a specific realization with
a hierarchical certificate-based encryption scheme that gives delegation
compact credentials.
In our RBCD, given a
privilege, two types of entities can delegate the privilege to others: 1) the
resource owner of the privilege and 2) a member of a role who is delegated the privilege
Decentralized role-based delegation allows users from administratively
Independent
domains to be dynamically joined according to the needs of the tasks. We have
also explored the applications of RBCD for efficient and flexible trust
establishment in decentralized and pervasive environments
1 comments:
hi..............
Post a Comment