dc.contributor.author |
Osman, Duaa Abdelmuniem Mohamed |
|
dc.contributor.author |
Supervisor, -Salaheldin Mohamed Ibrahim Edam |
|
dc.date.accessioned |
2019-12-19T10:04:43Z |
|
dc.date.available |
2019-12-19T10:04:43Z |
|
dc.date.issued |
2019-06-15 |
|
dc.identifier.citation |
Osman, Duaa Abdelmuniem Mohamed . Two-Factor Authentication and Role-based Access Control for Cloud Services \ Duaa Abdelmuniem Mohamed Osman ; Salaheldin Mohamed Ibrahim Edam .- Khartoum: Sudan University of Science and Technology, college of Engineering, 2019 .- 90p. :ill. ;28cm .- M.Sc |
en_US |
dc.identifier.uri |
http://repository.sustech.edu/handle/123456789/24176 |
|
dc.description |
Thesis |
en_US |
dc.description.abstract |
Cloud computing became a tendency technology for IT and non-IT organizations. Many sectors and organizations shift towards cloud computing technology. They adopt this technology to deploy their services. Many services and applications gained benefits from cloud computing since these services become accessible over the whole world via the cloud. Cloud computing mitigates the burden of constructing and maintaining large data centers for non-IT sectors. Cloud providers offer On-Demand, scalable and measured services for cloud consumers to deploy their services and store their sensitive data. Accessing the cloud is one of the major security issues. Cloud provider should apply robust access model to gain the trust of their customers. They should restrict the access and grant the consumer the least privileges that are needed to accomplish his/her task. For that role-based access control model adopted in this thesis. This model is implemented to protect cloud services from unauthorized access. A mechanism of the time-based one-time password as two-factor authentication is also implemented to overcome the weakness of static password. A model of an online education system was created as an example of a cloud service. The system was developed using PHP language. The system has different roles each role has the least permission was needed. And for authentication BLOWFISH BCRYPT hashing function was used to implement time-based one time password. This password is renewed every session and has a timestamp of 30 seconds and then became unusable. The system has the capability to authenticate and authorize users of different roles. One time password raises the reliability of the authentication process by sending the password to the user’s email. |
en_US |
dc.description.sponsorship |
Sudan University of Science and Technology |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Sudan University of Science and Technology |
en_US |
dc.subject |
Engineering |
en_US |
dc.subject |
Computer and Networks Engineering |
en_US |
dc.subject |
Two-Factor Authentication |
en_US |
dc.subject |
Role-based Access Control |
en_US |
dc.subject |
Cloud Services |
en_US |
dc.title |
Two-Factor Authentication and Role-based Access Control for Cloud Services |
en_US |
dc.title.alternative |
المصادقة ثنائية العامل والتحكم في الوصول استنادًا على الدور لخدمات الحوسبة السحابية |
en_US |
dc.type |
Thesis |
en_US |