Abstract:
The lab reports memo is an evaluation of two lab reports, “IBC-based entity authentication protocols for federated cloud systems” and “Cloud authorization: exploring techniques and approach towards effective access control framework.” The lab reports both discuss two distinct but similar issues in cloud cryptography and the different process of solving the issues. The “IBC” report discusses the security issues with entity authentication, which is the process by which one user is assured of the identity of another user in a verification protocol, in most Cloud-based systems. The “Cloud authorization” report examines the security and privacy problems with authorization in Cloud environments. Both reports provide different approaches to solving these problems.
Lab Reports Memo:
To: Professor Michael Coppola
From: Abdul Rafid
Date: March 9, 2020
Subject: Comparative analysis of “IBC-based entity authentication protocols for federated cloud systems” and “Cloud authorization: exploring techniques and approach towards effective access control framework”
The purpose of this comparative analysis is to provide my evaluation of two lab reports that focus on specific problems that exist in Cloud cryptography. Cloud cryptography refers to the encryption methods used to protect and secure data and information stored in Cloud systems. I chose to write my comparative analysis on the “IBC-based entity authentication protocols for federated cloud systems” lab report and the “Cloud authorization: exploring techniques and approach towards effective access control framework” lab report.
The “IBC” report discusses the security issues with entity authentication, which is the process by which one user is assured of the identity of another user in a verification protocol, in most Cloud-based systems. The report proposes the “layered security architecture” solution, which would provide a trust transmission mechanism among Cloud systems held by different organizations. In the “Cloud authorization” report, the author examines the security and privacy problems with authorization in Cloud environments. This report provides an analysis of multiple existing solutions to authorization in the Cloud and evaluates their effectiveness compared to established industry standards for fixing authorization issues.
The similarities between the two reports are that they both discuss security and privacy issues in Cloud cryptography and provide solutions to each issue. However, the way in which the reports differ is in the solutions each report provides and the way in which they provide their solutions. The “IBC” report proposes one solution and gives a thorough explanation, through experimentation, calculations, data collection, and analysis, of why that solution is the best way to solve entity authentication issues. On the other hand, the “Cloud authorization” report provides multiple researched and tested solutions to authorization issues and compares them to currently used methods of dealing with this issue by companies. The “IBC” report tries to convince its readers that the “layered security architecture” solution is the most viable solution to entity authentication issues while the “Cloud authorization” report tries to provide its readers with information that will allow them to decide for themselves which authorization technique is best for use in a Cloud system.
In closing, thank you for your time. If I may provide additional information, please contact me by phone at 929-303-2970 or by email at [email protected].
Thanks,
Abdul Rafid
Bibliography:
- Cao, C. et al (2013, May). IBC-based entity authentication protocols for federated cloud systems Citation metadata. Retrieved March 9, 2020, from https://go-gale-com.ccny-proxy1.libr.ccny.cuny.edu/ps/i.do?id=GALE|A334276588&v=2.1&u=cuny_ccny&it=r&p=AONE&sw=w
- Masood, R. et al (2015, January 16). Cloud authorization: exploring techniques and approach towards effective access control framework. Retrieved March 9, 2020, from https://link-springer-com.ccny-proxy1.libr.ccny.cuny.edu/article/10.1007/s11704-014-3160-4