Please use this identifier to cite or link to this item: https://repository.sustech.edu/handle/123456789/24176
Full metadata record
DC FieldValueLanguage
dc.contributor.authorOsman, Duaa Abdelmuniem Mohamed-
dc.contributor.authorSupervisor, -Salaheldin Mohamed Ibrahim Edam-
dc.date.accessioned2019-12-19T10:04:43Z-
dc.date.available2019-12-19T10:04:43Z-
dc.date.issued2019-06-15-
dc.identifier.citationOsman, Duaa Abdelmuniem Mohamed . Two-Factor Authentication and Role-based Access Control for Cloud Services \ Duaa Abdelmuniem Mohamed Osman ; Salaheldin Mohamed Ibrahim Edam .- Khartoum: Sudan University of Science and Technology, college of Engineering, 2019 .- 90p. :ill. ;28cm .- M.Scen_US
dc.identifier.urihttp://repository.sustech.edu/handle/123456789/24176-
dc.descriptionThesisen_US
dc.description.abstractCloud computing became a tendency technology for IT and non-IT organizations. Many sectors and organizations shift towards cloud computing technology. They adopt this technology to deploy their services. Many services and applications gained benefits from cloud computing since these services become accessible over the whole world via the cloud. Cloud computing mitigates the burden of constructing and maintaining large data centers for non-IT sectors. Cloud providers offer On-Demand, scalable and measured services for cloud consumers to deploy their services and store their sensitive data. Accessing the cloud is one of the major security issues. Cloud provider should apply robust access model to gain the trust of their customers. They should restrict the access and grant the consumer the least privileges that are needed to accomplish his/her task. For that role-based access control model adopted in this thesis. This model is implemented to protect cloud services from unauthorized access. A mechanism of the time-based one-time password as two-factor authentication is also implemented to overcome the weakness of static password. A model of an online education system was created as an example of a cloud service. The system was developed using PHP language. The system has different roles each role has the least permission was needed. And for authentication BLOWFISH BCRYPT hashing function was used to implement time-based one time password. This password is renewed every session and has a timestamp of 30 seconds and then became unusable. The system has the capability to authenticate and authorize users of different roles. One time password raises the reliability of the authentication process by sending the password to the user’s email.en_US
dc.description.sponsorshipSudan University of Science and Technologyen_US
dc.language.isoenen_US
dc.publisherSudan University of Science and Technologyen_US
dc.subjectEngineeringen_US
dc.subjectComputer and Networks Engineeringen_US
dc.subjectTwo-Factor Authenticationen_US
dc.subjectRole-based Access Controlen_US
dc.subjectCloud Servicesen_US
dc.titleTwo-Factor Authentication and Role-based Access Control for Cloud Servicesen_US
dc.title.alternativeالمصادقة ثنائية العامل والتحكم في الوصول استنادًا على الدور لخدمات الحوسبة السحابيةen_US
dc.typeThesisen_US
Appears in Collections:Masters Dissertations : Engineering

Files in This Item:
File Description SizeFormat 
Two-Factor Authentication ... .pdfResearch2.23 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.