Strengthening Authentication within OpenStack Cloud Computing System through Federation with ADDS System

Trinath Basu M
2020 International Journal of Emerging Trends in Engineering Research  
Open source cloud computing systems are frequently being used for the development of private cloud so that the cloud computing system can be updated and customized to meet the needs of the business establishments. Many open-source cloud computing systems are in use, and most of them suffer from one vulnerability or the other. Out of all the OpenStack, the open-source system used by 80% of the customers. The analysis of security built into the Open Stack reveals that much vulnerability exists,
more » ... ich makes the cloud computing system in-secured. Security is the primary concern considering authentication, authorization, and access control and data security. The mechanisms built into Open Stack to ensure a secure environment are vulnerable to attack. In OpenStack, the process of authentication implemented through the use of fernet tokens. The use of a fernet token for authentication reveals many weaknesses. Open Stack did not give much consideration to use the existing and proven authentication systems used, such as ADDC and IMS. Uses of proven authentication systems as a part of the implementation of authentication systems within the cloud computing system in conjunction with native Fernet tokens will help to improve the authentication system so that secured authentication services implemented within Open Stack. Using two authentications systems within the same cloud computing system leads to the requirement of Implementation of Multi-Factor Authentication. In this paper, the implementation of a Multifactor Authentication system that integrates the Native Fernet system and the most stabilized and worthwhile ADDS Authentication system so that a user can work with any of the Applications including the Open Stack system with the single sign-on. The proposed method implemented within the Open Stack through making changes to the source code, addition of independent components, and customization of the configuration files.
doi:10.30534/ijeter/2020/29812020 fatcat:yl5ycqsbujh45ln5gkxjjq66oi