ArticlePDF Available

Abstract and Figures

Cloud federation aims to cost-effective assets and resources optimization among heterogeneous environments where clouds can cooperate together with the goal of obtaining unbounded computation resources, hence new business opportunities. This paper describes an architecture for the federation establishment, where clouds that need external resources ask to federated clouds the renting of extra physical resources. Our architecture introduces a new module named Cross-Cloud Federation Manager including three agents (Discovery, Match-making and Authentication). In this work, we specifically focus on the authentication agent, which is responsible for a secure federation. To address such problem we propose a technical solution based on the IdP/SP model along with the SAML technology.
Content may be subject to copyright.
Three-Phase Cross-Cloud Federation Model: The Cloud SSO Authentication
Antonio Celesti, Francesco Tusa, Massimo Villari and Antonio Puliafito
Dept. of Mathematics, Faculty of Engineering, University of Messina
Contrada di Dio, S. Agata, 98166 Messina, Italy.
e-mail: {acelesti,ftusa,mvillari,apuliafito}@unime.it
Abstract—Cloud federation aims to cost-effective assets and
resources optimization among heterogeneous environments
where clouds can cooperate together with the goal of obtaining
“unbounded” computation resources, hence new business op-
portunities. This paper describes an architecture for the feder-
ation establishment, where clouds that need external resources
ask to federated clouds the renting of extra physical resources.
Our architecture introduces a new module named Cross-Cloud
Federation Manager including three agents (Discovery, Match-
making and Authentication). In this work, we specifically focus
on the authentication agent, which is responsible for a secure
federation. To address such problem we propose a technical
solution based on the IdP/SP model along with the SAML
technology.
Keywords-Cloud Computing; Cross-Cloud; Heterogeneous
Systems; Federation; Security, Trustiness; SAML.
I. INTRODUCTION
Cloud computing brings a new level of efficiency in deliv-
ering services, representing a tempting business opportunity
for IT operators of increasing their revenues. Services are
classified as Infrastructure as a Service (IaaS), Platform as a
Service (PaaS), or Software as a Service (SaaS) [1], whereas
clients might range from other clouds, organizations, and
enterprises to single users.
Currently, the cloud scenario includes hundreds of in-
dependent, heterogeneous, private/hybrid clouds but, many
business operators have predicted that the process toward
an interoperable federated cloud scenario will begin shortly.
In [2], the evolution of the cloud computing market is hy-
pothesized in three subsequent stages: stage 1 “Monolithic”
(now), cloud services are based on proprietary architectures
- islands of cloud services delivered by megaproviders (this
is what Amazon, Google, Salesforce and Microsoft look
like today); stage 2 “Vertical Supply Chain”, over time,
some cloud providers will leverage cloud services from
other providers. The clouds will be proprietary islands yet,
but the ecosystem building will start; stage 3 “Horizontal
Federation”, smaller, medium, and large providers will fed-
erate horizontally themselves to gain: economies of scale,
an efficient use of their assets, and an enlargement of their
capabilities.
This work describes how to make up an interoperable
heterogeneous cloud environment in a “Horizontal Feder-
ation” configuration, where clouds can cooperate together
accomplishing trust contexts and providing new business
opportunities, such as cost-effective assets optimization,
power saving, and on-demand resources provisioning. In
particular, we carry out what the involved issues are, an-
alyzing a resource provisioning scenario and proposing an
architectural solution. For simplicity, in the rest of the paper,
with terms such as “cross-cloud federation”, “federation in
cloud computing”, or “cloud federation” we will refer to the
above mentioned “Horizontal Federation”.
In this work we propose a three-phase cross-cloud fed-
eration model where, the federation establishment between
a cloud needing external resources and a cloud offering
resources, passes through three main phases: discovery, the
cloud looks for other available clouds; match-making, the
cloud selects between the discovered clouds the ones, which
fit as much as possible its requirements; authentication, the
cloud establishes a trust context with the selected clouds.
According to our three-phase model, we designed a module
named Cross-Cloud Federation Manager (CCFM) including
three agents (Discovery, Match-making and Authentication)
responsible to accomplish the aforementioned three phases.
More specifically, we focus on the authentication agent,
which is responsible for a secure federation. The authenti-
cation phase poses many serious problems in a cross-cloud
federation establishment due to the need for each cloud
of managing a huge number of credentials depending on
the security mechanisms employed in each infrastructure.
Instead, in our opinion, a cloud should be able to authenti-
cate itself with other heterogeneous clouds regardless their
security mechanisms, performing the log-in once, gaining
the access to all required resources. We identify this issue
as: Cloud Single-Sign On (SSO) Authentication. To address
such problem, we propose a technical solution based on the
Security Assertion Markup Language (SAML) technology
[3]. More specifically, we designed a new SAML profile
named Cross-Cloud Authentication Agent SSO (CCAA-
SSO), which defines the steps needed for a secure cloud
SSO authentication to be performed by the authentication
agents of the involved clouds.
The paper is organized as follows. Section II describes the
state of the art of cloud federation. After planning a resource
provisioning scenario of cooperating clouds, in Section III,
we provide a detailed analysis of cloud federation require-
ments, introducing the concept of home cloud and foreign
cloud. In section IV, we introduce our three-phase federation
model. In addition it is presented the Cross-Cloud Federation
Manager (CCFM), a module deployable on each cloud
middleware, responsible to accomplish the three federation
phases by means of three autonomous software agents. In
Section V, we focus on the authentication phase and in par-
ticular on the cloud SSO authentication problem presenting
our solution, the new SAML CCAA-SSO profile. A detailed
description of the messages exchanging flow is also provided
with practical examples. Conclusions and lights to the future
are summarized in Section VI.
II. RE LATE D WORK
Cloud computing is generally considered as one of the
more challenging research field in the IT world. Interesting
research areas are strictly related to cloud computing such
as security, privacy, trustiness and federation. Considering
the federation perspective, new terms are also been coined
as Intercloud (“Think of the existing cloud islands merging
into a new, interoperable Intercloud where applications can
be moved to and operate across multiple platforms...” [4])
or Cross-cloud (“For the benefit of human society and the
development of cloud computing, one uniform and interop-
erable Cross-cloud platform will surely be born in the near
future...” [5]).
A few works are available in literature related to cloud
federation. The main reason is that several pending issues
concerning security and privacy still have to be addressed,
and a fortiori, is not clear what cloud federation actually
means and what the involved issues are [6]. Nowadays,
the latest trend to federate applications and service oriented
architectures (SOAs) over the Internet is represented by
the Identity Provider/Service Provider (IdP/SP) model [7].
Examples are the aforementioned SAML, OpenID [8], Shib-
boleth [9] and Cardspace [10]. Such solutions, considered
alone, do not solve the cloud federation issues. In fact, the
federation problem in cloud computing is greater than the
one in traditional systems. The main limit of the existing
federation solutions is that they are designed for static
environments requiring a priori policy agreements, whereas
clouds are high-dynamic and heterogeneous environments,
which require particular automatic security and policy ar-
rangements. Keeping in mind the cloud federation perspec-
tive, several security issues are already picked out. Interop-
erability in federated heterogeneous cloud environments is
faced in [5], in which the authors propose a trust model
where the trust is delegated between trustworthy parties,
which satisfy certain constrains. Instead, the data location
problem is treated in [11] where it is proposed a privacy
manager to solve the problems of the data compliance to
the laws of different jurisdictions.
Nevertheless, such works do not fully clarify what it is
really meant with the term cloud federation. Basically, it is
not fully evaluated when, why, and how a cloud federation
should be established and what the impact over the existing
infrastructure, the involved architectural issues, and the
security concerns are. Therefore, we think a cloud federation
model addressing architectural and security issues, also
with implementation practice compliant with existing cloud
infrastructures, is strongly needed.
III. CROS S- CL OU D FED ER ATIO N ANALYSI S:O UR
REF ER EN CE SCENARIO
In this Section we try to clarify ideas concerning the
general concept of cross-cloud federation. In order to iden-
tify requirements and goals, we propose a possible resource
provisioning scenario where clouds might benefit of feder-
ation advantages. Cloud Computing relies its computational
capabilities exploiting the concept of “virtualization”. This
technology has re-emerged in recent years as a compelling
approach of increasing resource utilization and reducing
IT services costs. The common theme of all virtualization
technologies is hiding the underlying infrastructure by in-
troducing a logical layer between the physical infrastructure
and the computational processes. The virtualization is being
possible thanks to Virtualization Machine Monitors (VMMs
commonly known as “hypervisors”), i.e. processes that run
on top of a given hardware platform, control and emulate one
or more other computer environments (virtual machines).
Each of these virtual machines, in turn, runs its respective
“guest” software, typically an operating system, executed as
if it is installed on a stand-alone hardware platform.
Private clouds hold their own virtualization infrastructure
where several virtual machines are hosted to provide services
to their clients. In a scenario of “cross-cloud federation”,
each cloud operator is able to transparently enlarge its
own virtualization resources amount (i.e., increasing the
number of instantiable virtual machines) asking computing
and storage capabilities to other clouds. Consequently, the
cloud operator will be able to satisfy any further service
allocation request sent by its clients.
According to our analysis, within the above mentioned
scenario we distinguish two types of cloud: home cloud
and foreign cloud. Home cloud is a cloud provider which
is unable to instantiate further virtual machines as the
capability of its virtualization infrastructure is saturated
and consequently, forwards federation requests to foreign
clouds with the purpose to host its own virtual machines
on their virtualization infrastructures. Instead, foreign cloud
is a cloud provider which leases part of the storage and
computing capabilities of its virtualization infrastructure to
home clouds for free or by charge. A cloud provider could
be at the same time both home cloud and/or foreign cloud.
In order to better explain such idea, we consider the
reference scenario depicted in Figure 1. When a home cloud
realizes that its virtualization infrastructure has saturated
its capabilities, in order to continue providing services to
its clients (i.e., other clouds, enterprises, generic end users,
etc), it decides to federate itself with foreign clouds A and
Figure 1. Cross-Cloud Scenario: basic for heterogeneous and federated
clouds.
B. The home cloud, besides hosting virtualization resource
inside its own virtualization infrastructure, is also able to
hosting virtual machines inside the foreign clouds A and
B virtualization infrastructures, enlarging the amount of
its available virtualization resources (See Figure 1, bottom
part). Therefore, although the virtualization resources rent
to the home cloud are physically placed within the virtual-
ization infrastructures of foreign clouds A and B, they are
logically considered as resources indeed hosted within the
home cloud virtualization infrastructure.
Despite the obvious advantages, the implementation of
such cross-cloud federation scenario is not at all trivial.
The main reason is that clouds are more complicated than
traditional systems and the existing federation models are not
applicable. In fact, while clouds are typically heterogeneous
and dynamic, the existing federation models are designed for
static environments where it is needed an a priori agreement
among the parties to make up the federation. Keeping in
mind the aforementioned scenario, we think cloud federation
needs to meet the following requirements: a) automatism
and scalability, a home cloud, using discovery mechanisms,
should be able to pick out the right foreign clouds which
satisfies its requirements reacting also to cloud changes; b)
interoperable security, it is needed the integration of differ-
ent security technologies, for example, permitting a home
cloud to be able to join the federation without changing
its security policies. In the “interoperable security” context
we identify: 1) SSO authentication, a home cloud should
be able to authenticate itself once gaining the access to the
resources provided by federated foreign clouds belonging
to the same trust context without further identity checks;
2) digital identities and third parties, each home cloud
should be able to authenticate itself with foreign clouds
using its digital identity guaranteed by a third party. This
latter feature is more challenging because it implies a cloud
has to be considered as a subject uniquely identified by some
credentials.
IV. CROSS-CLOUD FEDERATION: ARCHITECTURAL
OVE RVIEW
In Section III, we described the concept of federation and
its bindings with the cloud. In the following, we provide
a detailed description of the approach used to address the
cross-cloud federation issues. Considering the requirements
of automatism, scalability and interoperability previously
stated, our solution tries to answer all such issues. Describ-
ing the federation process we point out three main different
phases: discovery,match-making and authentication. These
phases are opportunely explained in the following.
A. The Three-Phase Cross-Cloud Federation Model and the
Cross-Cloud Federation Manager
Figure 2. CCFM for the management of the cross-cloud federation inside
the general three-layers cloud architecture.
In order to identify the main components constituting a
cloud and better explain the federation idea on which our
work is based, we are considering the internal architecture
of each cloud as the three-layered stack [12] presented
schematically in Figure 2. Starting from the bottom, we
can identify: Virtual Machine Manager,Virtual Infrastruc-
ture (VI) Manager and Cloud Manager. VI Manager is
a fundamental component of private/hybrid clouds acting
as a dynamic orchestrator of Virtual Environments (VEs),
which automates VEs setup, deployment and management,
regardless of the underlying Virtual Machine Manager layer
(i.e., Xen, KVM, or VMware). The Cloud Manager layer
is instead able to transform the existing infrastructure into
a cloud, providing cloud-like interfaces and higher-level
functionalities for security, contextualization and VM disk
image management.
In a cloud architecture designed according to the afore-
mentioned three-layered stack, all the cloud components and
their respective functions are clearly defined and separated,
thus introducing simplicity and efficiency when the cloud
middleware has to be modified or new functionalities have
to be added. In our work, we exploited such modular char-
acteristics of the layered cloud architecture, and introduced
a new component within the Cloud Manager layer (depicted
in the top part of Figure 2), named Cross-Cloud Federation
Manager (CCFM). The CCFM has been conceived for
enabling each cloud to perform all the operations needed
to pursue the target of the federation establishment.
The cross-cloud scenario we are considering can be seen
as an highly dynamic environment: new clouds, offering
different available resources and different authentication
mechanisms could appear, while others could disappear.
Taking into account such dynamism, when a home cloud
needs to “lease” external resources from a foreign cloud,
the first step the home cloud will perform refers to the
discovery (phase 1) of the foreign cloud, which properly
matches (phase 2) its requirements (both in terms of avail-
able resources and supported authentication mechanisms).
Once these two steps have been performed, and the best
foreign cloud has been found, in order to establish a secure
interaction between the home cloud and the selected foreign
cloud, an authentication (phase 3) process will begin.
The CCFM module represents the main “actor” in our
three-phase federation model. In our design, it consists of
three different subcomponents (agents) each addressing a
different phase of the federation model:
The discovery agent manages the discovery process
among all the available clouds within the dynamic
environment. Since its state is pretty flexible and dy-
namic, the discovery process has to be implemented in
a totally distributed fashion: all the discovery agents
must communicate exploiting a p2p approach.
The match-making agent accomplishes the task of
choosing the more convenient foreign cloud, evaluat-
ing all the parameters regarding the QoS, available
resources and available authentication mechanisms. By
means of specific algorithms, this agent is able to
evaluate from all the available (discovered) clouds, the
ones that best “fit” the requirements (e.g. the load
capacity in terms of resources leasing and the supported
authentication methods) of its home cloud.
The authentication agent, cooperating with third parties
trusted entities, takes part in the creation of a security
context between home and foreign clouds. When the
authentication phase begins, the home cloud authenti-
cation agent contacts its “peer” on the foreign cloud:
the authentication process between such agents (and
thus the clouds) will be lead exchanging authentication
information in form of meta-data, also involving trusted
third parties in the process. The Authentication Agent
communicates both with other peers and third parties
via web service interfaces.
The accomplishment of the authentication process, carried
out by the authentication agents of both home and foreign
clouds, leads to the establishment of a secure and direct
connection between the related VI Manager Layer of the
same clouds. As consequence, the home cloud will be
able to instantiate (or migrate) Virtual Resources (VMs) on
the Foreign Cloud in a secure environment. The concept
of migration can be seen as the opportunity to move the
Virtual Machines not only in intra-site domain but also to
transfer them on federated inter-site domains. In this case
the migration might occur across subnets, among hosts that
do not share storage and across administrative boundaries.
Although in Section IV-B we’ll describe the three phases
needed to pursue the cloud federation, the main scope of this
paper refers to the solution of the cloud SSO authentication
problem.
In our work, the practical solution to overcome the
authentication problem is the introduction the well-known
concept of Identity Provider (IdP) along with a new SAML
profile (further details are presented in Section V).
B. The Three-Phase Cross-Cloud Federation Process:
a Concrete Scenario
In this Section, we provide a more detailed description
of the three-phase cross-cloud federation model considering
the scenario represented in Figure 3. As depicted, such
scenario includes both home clouds and foreign clouds,
which are represented according to the layered model al-
ready discussed. The highest stack level of these clouds also
comprises the CCFM module, which comes with its own
agents (discovery, match-making and authentication).
Figure 3. Example of cross-cloud federation establishment.
We remarked the need of providing a global authentication
mechanism exploitable from all the entities belonging to the
cloud federation. In Figure 3, together with home clouds
and foreign clouds, IdPs are also depicted. An IdP is a
provider of digital identity representing a trusted third party,
which provides authentication services to its clients. In such
scenario we assume each home cloud must have one digital
identity at least on one IdP (even though many cloud digital
identities may exist on different IdPs), whereas each foreign
cloud must be trusted or compliant with one or more IdPs.
Before explaining our motivation to the introduction of IdP
within our scenario, we provide a description of the three
phases needed to achieve the cloud federation.
In the scenario of federation establishment depicted in
Figure 3, during the step 1, the home cloud manager layer
receives a request for services from its clients and sends
a resource allocation request (i.e. virtual machines) to the
underlying VI manager layer. In step 2 the home cloud VI
manager, evaluating its instantaneous workload, replies to
the request notifying it has not enough resources. In step 3
(the discovery phase) the home cloud manager decides to
ask for resources to foreign clouds: the resource request is
forwarded to the CCFM, which, by means of its discovery
agent, will begin the discovery process to obtain a list of all
the available foreign clouds. The discovery phase can exploit
whatever p2p approach to achieve the complete list of cloud
providers. Each discovered foreign cloud is associated to a
set of meta-data describing several cloud information: the
amount and type of the resources available for leasing, the
offered SLA level and the supported IdP(s). In this particular
example, the agent has found the set of discovered foreign
clouds SD={A, B, C, D , E, F, G}.
In step 4 the match-making phase begins: the match-
making agent of the home cloud selects from the set of
discovered foreign clouds SDthe ones, which fits its re-
quirements. The adopted criteria to perform the selection
is based on two different evaluation tasks: in the first one,
starting from the foreign clouds set SD, a new subset
SR={A, B, D, G}is obtained considering the foreign
clouds better satisfying the home cloud request in terms of
resources availability (CPU, RAM, storage) and QoS. In the
second evaluation task, starting from the discovered foreign
clouds set SD, the match-making agent selects the subset
of foreign clouds SIdP ={A, B , D, E}, having trusted
relationship(s) with the IdP(s) on which the home cloud
already has a digital identity. In this example foreign clouds
A, B, D, and E are trusted with the IdP X, which provides
authentication services to the home cloud guaranteeing for
its digital identity. The subsequent operation accomplished
by the match-making agent refers to the definition of the set
of match-made clouds SM=SRSIdP .
We now define the metrics Rreq and Rof f (Fi)represent-
ing respectively a measure of the resources requested by
the home cloud, and a measure of the resources offered by
the foreign cloud Fi. The value of the metric is obtained
evaluating different parameters such as CPU, RAM, storage
and QoS for both Rreq and Rof f (Fi). In order to identify
which foreign clouds fit the home cloud requirements, the
match-making agent achieves a list of preferred foreign
clouds Ford(SM)={F1, F2, . . . , Fn}considering the set SM
and ordering its element by the Rof f value, in a descending
order.
Considering the example depicted in Figure 3, SM=
{A, D, B}and Ford(SM)={A, B, D}. The match-making
agent has to consider the resources provided by the first k
foreign clouds of Ford(SM)to satisfy the condition Rreq
Pk
i=1 Rof f (Fi),1kn(in the scenario depicted in
Figure 3, we assume k= 2 and consequently both foreign
clouds A and B will be chosen to establish the federation).
In step 5 (authentication phase), in order to establish
a federation with foreign cloud A and B, a cloud SSO
authentication process has to be started by the home cloud.
Such process will involve: the authentication agent of the
home cloud, the corresponding peers of the foreign cloud
A and B and the IdP X (trusted with A and B, on which
the home cloud has a digital identity) where the home cloud
performs a SSO log-in. Once the home cloud and foreign
cloud A authentication agents establish a trust context, their
respective underlying VI manager layers setup a low-level
trust context allowing the cross-cloud resource provisioning.
Therefore, the home cloud VI manager will be able to
instantiate virtual resources on the foreign cloud VI manager.
Even if cross-cloud federation has to be established also
with foreign cloud D, no further authentication tasks would
be needed because foreign cloud D has already a trusted
relationship with IdP X.
As can be perceived, the employment of the IdPs presents
some advantages well fitting our cross-cloud federation
scenario: even though each cloud has its internal security
mechanisms, whatever the foreign cloud is, regardless of
its authentication mechanisms, by means of IdPs a home
cloud will be able to authenticate itself with other foreign
clouds already having a trust relationship, exploiting the
well-known concept of SSO. The resource provisioning in
cross-cloud federation may be solved establishing trust rela-
tionships between the clouds using several IdPs containing
the credentials of the cloud asking for resources. Section V
better describes the steps involved in phase 5, pointing out
the technologies employed to implement the authentication
and the set of information exchanged between the involved
entities. The same Section describes our new SAML profile
designed to accomplish the cloud SSO authentication in a
federated scenario.
V. AUTHENTICATION PRACTICE USIN G SAML
In this Section, after a brief description of the SAML
standard, we focus on the authentication phase of our three-
phase cloud federation model performed by the Authentica-
tion Agent. More specifically, using the SAML technology
we propose a new Cross-Cloud Authentication Agent SSO
Profile, which describes the messages exchanging flow be-
tween a home cloud, foreign clouds and IdPs during the
establishment of a trust context.
In order to explain the authentication process (step 5
of Figure 3), we consider the SAML technology. SAML
is an XML-based standard for exchanging authentication
and authorization assertions between security domains, more
specifically, between an identity provider (IdP) (a producer
of assertions) and a generic service provider (SP) (a con-
sumer of assertions). SAML consists of: a subject, a person
or a software/hardware entity that assumes a particular
digital identity and interacts with an online application,
composed of several heterogeneous systems; a SP or relying
party, a system, or administrative domain, that relies on
information supplied to it by the Identity Provider; an IdP
or asserting party, a system, or administrative domain, that
asserts information about a subject. In literature, such model
is also referred as IdP/SP.
SAML combines four key concepts: assertion, binding,
protocol and profile. Assertion consists of a package of in-
formation that supplies one or more statements (i.e., authen-
tication, attribute, and authorization decision) made by the
IdP. Authentication statement is perhaps the most important
meaning the IdP has authenticated a subject at a certain time.
A Protocol (i.e., Authentication Request, Assertion Query
and Request, Artifact Resolution, etc) defines how subject,
service provider, and IdP might obtain assertions. More
specifically, it describes how assertions and SAML elements
are packaged within SAML request and response elements.
A SAML binding (i.e., SAML SOAP, HTTP Redirect (GET),
HTTP POST, etc) is a mapping of a SAML protocol message
over standard messaging formats and/or communications
protocols. A profile (i.e., Web Browser SSO, Enhanced
Client or Proxy (ECP), Single Logout, Attribute, etc) is a
technical description of how a particular combination of
assertions, protocols, and bindings defines how SAML can
be used to address particular scenarios.
A. Our Testbed Overview
In order to solve the cloud SSO authentication problem,
pointed out in Section IV-A, we prearranged a testbed
involving three clouds where OpenQRM [13] has been
employed as VI manager. Although the cloud manager layer
depicted in Figure 2 includes several modules performing
different high level features, the software system deployed
on our testbed just implements the authentication agent
of the CCFM exposing both SOAP web services for the
communication with other peers, and software interfaces for
the communication with the underlying layer (OpenQRM).
Along with such software implementation, we also extended
the OpenQRM capabilities, enabling web service commu-
nications between different OpenQRM platforms (feature
not supported natively), in order to permit the interaction
between different clouds VI managers.
The authentication agent has been designed both to man-
age the digital identity of the home cloud and to perform au-
thentication tasks sending/receiving authentication requests
to/from foreign clouds, interacting with their respective peer
modules. More specifically the authentication agent does
not directly manages the digital identity of the cloud, but
uses one or more trusted IdPs acting as guarantor when
the agent likes to authenticate the home cloud with other
foreign clouds during the federation establishment. As far as
regards the authentication phase, the agent implements our
own SAML profile (described in Section V-B), which defines
the messages exchange flow between the home cloud, the
foreign clouds, and the IdP, solving the cloud SSO authen-
tication problem. More specifically, the implementation of
the profile has been accomplished using and extending the
java libraries of the OpenSAML project [14] for both the
authentication agents and the IdP. In order to accomplish
such tasks, the agent has been developed exposing a web
service interface using the SOAP [15] technology, but noth-
ing prevents the adoption of other web service technologies
such as REST, JAX-RPC, or XML-RPC.
B. The SAML Cross-Cloud Authentication Agent SSO
(CCAA-SSO) Profile
To address the cloud SSO authentication problem, during
the cross-cloud federation establishment we developed a new
SAML profile named Cross-Cloud Authentication Agent
SSO (CCAA-SSO). Such profile was designed to enable a
home cloud to perform SSO authentication on several for-
eign clouds both having a trusted relationship with the home
cloud’s IdP and regardless their security mechanisms. Such
authentication process is fundamental for the subsequent
establishment of a secure channel between the home cloud
VI manager and one or more foreign cloud VI manager(s).
Once the secure channel has been established the home
cloud is able to gain the access to the required resources
offered by the foreign cloud.
In a CCAA-SSO profile use case, both the home cloud
and the foreign cloud, by means of their own Authentication
Agents, represent respectively the subject and the relying
party, whereas the IdP acts as the third party asserting to a
foreign cloud the trustiness of the home cloud identity. The
CCAA-SSO profile has been designed as a combination of
the following SAML elements: an assertion including an
authentication statement, a request-response protocol, and a
SAML SOAP Binding.
Considering the scenario already pointed out in Section
IV-B, in the following we describe the authentication process
previously marked as phase 5 keeping in mind our SAML
CCAA-SSO profile. In Figure 4 is shown the flow of
messages exchanged between the home cloud, the foreign
cloud A and the IdP X, putting aside for the time being
foreign cloud B. More specifically, inside each cloud both
Authentication Agent and the VI Manager are involved in
the process.
In step 5.1 the Authentication Agent, on behalf of the
home cloud manager, forwards to the corresponding peer of
the foreign cloud A a SOAP request for a set of virtual
resources by means of a XML document. In the SOAP
request message reported below, such document is embedded
inside the <ResourceType>element and is not depicted for
briefness.
Figure 4. Sequence diagram describing the steps of the CCAA-SSO profile
during the authentication of the home cloud with the foreign cloud A by
means of the IdP X.
<?xm l v e r s i o n =” 1 . 0 e n c o d i n g =” UTF8”?>
<S: En v e l o p e x ml n s : S = ” h t t p : / / sc h e m a s . x m l s o ap . or g / s o a p /
e n v e l o p e /” >
<S: H e ad er />
<S: Bo dy>
<ns 2 :AAFo r e i g n C l o u d ARe sRe q x ml ns : n s2 = ” h t t p s : / /
cl o u d A . n e t /SAML2/”>
<ResourceType>XML re s o u r c e d e s c r i p t i o n
document”</ResourceType>
</ns 2 :AAFo r e i g n C l o u d AResReq>
</S : Bo dy>
</S : E nv el op e>
In step 5.2 the Authentication Agent of the foreign cloud
A responds to the home cloud with a SAML authen-
tication request containing an authentication query. Con-
sidering the underlying SAML/SOAP response, the au-
thentication request is provided by means of the element
<samlp:AuthnRequest...>.
<?xm l v e r s i o n =” 1 . 0 e n c o d i n g =” UTF8”?>
<S: En v e l o p e x ml n s : S = ” h t t p : / / sc h e m a s . x m l s o ap . or g / s o a p /
e n v e l o p e /” >
<S: Bo dy>
<ns 2 :AAFo r e i g n C l o u d AR es Re qR e sp on se x ml ns : n s2 = ”
h t t p : / / w e b s e r v i c e s /” >
<r e t u r n >
<sa m l p : A u t h n R e q u e s t x ml n s : s a m lp =” u r n : o a s i s : n a me s
: t c :SAML: 2 . 0 : p r o t o c o l x ml n s : s am l =” u rn :
o a s i s : n ame s : t c :SAML : 2 . 0 : a s s e r t i o n I D= ” df a 6
V e r si o n = ”2 . 0” I s s u e I n s t a n t =”2010 0112 T18
: 3 4 : 4 2 Z ” A s s e r t i o n C o n s u m e r S e r v i c e I n d e x =”0” >
<sa m l : I s s u e r >h t t p s : / / cl o ud A . n e t / SAML2</s am l :
I s s u e r >
<sa ml p : Nam eI DP oli cy
A l l o w C r e a t e = ” t r u e
Fo rm a t= ” ur n : o a s i s : n ame s : t c : SAML : 2 . 0 : na me id
f or m at : t r a n s i e n t ” />
</sa mlp : Au th nR eq ues t>
</ r e t u r n >
</ns 2 :AAFo r e i g n C l o u d AResReqResponse>
</S : Bo dy>
</S : E nv el op e>
In step 5.3 the Authentication Agent of the home cloud
unpacks the authentication request received at step 5.2
and forwards it via SAML/SOAP to the IdP X, making
a SSO request. Since a valid trust context does not
exist, in step 5.4 the IdP X authenticates the home cloud
using a given security technology (the independence
from the security technology used by each cloud is
accomplished). In step 5.5, since the home cloud identity
is verified, the IdP X responds to the authentication
request by means of the following SAML/SOAP
response, identified by the element <samlp:Response...>.
Such element contains an assertion (see element
<saml:Assertion...>) with an authentication statement (see
element <saml:AuthnStatement...>) and has been signed by
the IdP X (see elements <saml:Issuer>and <ds:Signature
xmlns:ds=http://www.w3.org/2000/09/xmldsig#>).
<?xm l v e r s i o n =” 1 . 0 e n c o d i n g =” UTF8”?>
<S: En v e l o p e x ml n s : S = ” h t t p : / / sc h e m a s . x m l s o ap . or g / s o a p /
e n v e l o p e /” >
<S: Bo dy>
<ns 2 : Id pXSSOSe r v i c e R e s p o n s e xm l n s : n s 2 = ” h t t p : / /
webservices/”>
<r e t u r n >
<sa m lp : R e sp o ns e x ml n s : s am l p= ” u rn : o a s i s : n ame s : t c :SAML
: 2 . 0 : p r o t o c o l ” xm ln s : s a ml = ” u rn : o a s i s : n am es : t c :
SAML: 2 . 0 : a s s e r t i o n ID = ”7 d4 6” I nR es p on se T o= ” d fa 6 ”
V e r s i o n = ” 2 . 0 ” I s s u e I n s t a n t =” 2010 011 2T1 8 : 3 5 : 2 3 Z
D e s t i n a t i o n =” h t t p s : / / cl ou d A . n et /SAML2/ SSO /SOAP
>
<sa m l : I s s u e r >h t t p s : / / i d px . n e t / SAML2</s am l : I s s u e r >
<sa m l p : S t a t u s >
<sa m l p : S t a t u s C o d e V al u e = ” u r n : o a s i s : n a me s : t c : SAML : 2 . 0 :
s t a t u s : Su c c e s s ”/ >
</ sa m lp : S t a t u s >
<sa m l : A s s e r t i o n xm ln s : s am l =” u rn : o a s i s : na me s : t c : SAML
: 2 . 0 : a s s e r t i o n ID = ” f 8 a b ” V e r s i o n = ” 2 . 0 ”
I s s u e I n s t a n t =”2 01001 12T 18 : 3 5 : 2 3 Z”>
<sa m l : I s s u e r >h t t p s : / / i d px . n e t / SAML2</s am l : I s s u e r >
<ds : S i g n a t u r e xm l ns : d s =” h t t p : / / www . w3 . o r g / 2 0 0 0 / 0 9 /
xmldsig#>
mgQpzcz4tfZDPCOZfGhyodpRrYHbk4Le / i +
iynUjpW2uAgCvPJTSweVTofRcy8tHrvz6h5g2KOdB
8XY9+h / 4 euIVxg5vXuD6PldBqWgKYtY84+910 IP7TXQJS /
cblOCIf2TdMo55vR0QGDYdBt2yRXd1
wCUfbWNBy97ODoEvTtptJtpjp9NNkZS7g9w0TJFKlI /
OJUOO93dtaSAF6WVid55JE4oraYFEFMfO
hdttW0jOIazNLSIr8qp7mt0C8jWLBrRsIChVGDML4s+
xEyyN4hrCEvz2hIcLYA5Q4B1HTKryMCw5
PIJt0eaTeMicjAyrNLuJnLmMmDbE50KsRoo+yA==
</ ds : Si g n a t u r e >
<sa m l : S u b j e c t >
<sa m l : NameID F or ma t =” u rn : o as i s : n ame s : t c : SAML: 2 . 0 :
nameidfo r ma t : t r a n s i e n t ”>
5 a4 2 ed c 7 64394de 9 12d2 836a74df279c
</ sa ml : Nam eID>
<sa m l : S u b j e c t C o n f i r m a t i o n Me th od =” u rn : o a s i s : n am es :
t c : SAML : 2 . 0 : cm: b ea r e r”>
<sa m l : S u b j e c t C o n f i r m a t i o n D a t a I n Re s p on s e To = ” d f a 6 ”
R e c i p i e n t = ” h t t p s : / / cl o ud A . n e t / SAML2/ SSO /
SOAP” N ot O n O rA f t er = ”201 001 12T 18 : 4 0 : 2 3 Z” />
</ sa m l : S u b j e c t C o n f i r m a t i o n >
</ sa m l : S u b j e c t >
<sa m l : Co n d i t i o n s N o t B e f o r e =”20 100 112 T18 : 3 0 : 2 3 Z”
NotOnOrAfter=”20100112 T18 : 4 0 : 2 3 Z”>
<sa m l : A u d i e n c e R e s t r i c t i o n >
<sa ml : A ud ie nc e>h t t p s : / / c lo ud A . ne t / SAML2</s aml :
Audience>
</ sa m l : A u d i e n c e R e s t r i c t i o n >
</ sa m l : C o n d i t i o n s >
<sa m l : A u th n S t a te m e n t A u t h n I n s t a n t =”2 0100112 T18
: 3 5 : 1 7 Z” S e s s i o n I n d e x =” 7 3 d8”>
<sa ml : A ut hn Co n te xt>
<saml: AuthnContextClassRef>
u rn : o a s i s : n ame s : t c : SAML : 2 . 0 : a c : c l a s s e s :
PasswordProtectedTransport
</saml: AuthnContextClassRef>
</sa ml : A ut hn Co nt ex t>
</ sa m l : A u t h n S t a t e m e n t >
</ sa m l : A s s e r t i o n >
</sa ml p : Re spo ns e>
</ r e t u r n >
</ns 2 : Id pXSSOServiceResponse>
</S : Bo dy>
</S : E nv el op e>
In step 5.6 the Authentication Agent of the home cloud
unpacks the authentication assertion received in step 5.5
and forwards it to the underlying VI Manager. In step 5.7
the VI manager of the home cloud sends the authentication
assertion via SAML/SOAP to the corresponding peer of the
foreign cloud A. In step 5.8 the VI manager of the foreign
cloud B forwards the received authentication statement to
its authentication agent, which verifies its correctness. In
step 5.9 the VI manager of the foreign cloud B receives a
notification about the authentication assertion validity and
allocates the resources requested by the home cloud at step
5.1. In step 5.10 the VI manager of the foreign cloud contacts
its peer on the home cloud notifying where and how to
access the requested resources, for example establishing a
secure communication channel.
The authentication process of the home cloud with the
foreign cloud B is analogous to the one already described
for foreign cloud A, with one important difference: since
the home cloud has already performed the authentication
on the IdP X in phase 5.4, no further authentication is
needed because a trust context already exists (the SSO
is thus accomplished). Therefore, the SAML CCAA-SSO
profile combines both security and flexibility ensuring cloud
SSO authentication in cross-cloud federation environments
between clouds, using different security technologies rep-
resenting a possible solution for secure federated cloud
interactions.
VI. CONCLUSIONS AND FUTURE WORKS
In this paper we tackled the cross-cloud federation prob-
lem performing an in depth analysis and proposing a three-
phases model. An architectural solution including the Cross-
Cloud Federation Manager (CCFM) has been designed and
described. Furthermore, an implementation practice of the
Authentication Agent using a SAML CCAA-SSO profile has
been developed and some examples are also proposed. In fu-
ture, we plan to study the performances of such cross-cloud
federation scenario, evaluating the amount of authentications
and IdP enrollments needed, either employing real testbeds
or by means of a simulated environment, including hundreds
of clouds dynamically joining and leaving federations.
ACK NOW LE DG EM EN TS
The research leading to the results presented in this paper
has received funding from the European Union’s seventh
framework programme (FP7 2007-2013) Project RESER-
VOIR under grant agreeement number 215605.
REFERENCES
[1] I. Foster, Y. Zhao, I. Raicu, and S. Lu, “Cloud computing and
grid computing 360-degree compared,” in Grid Computing
Environments Workshop, 2008. GCE ’08, pp. 1–10, 2008.
[2] T. Bittman, “The evolution of the cloud
computing market,” Gartner Blog Network,
http://blogs.gartner.com/thomas bittman/2008/11/03/the-
evolution-of-the-cloud-computing-market/, November 2008.
[3] SAML V2.0 Technical Overview, OASIS, http://www.oasis-
open.org/committees/ download.php/11511/sstc-saml-tech-
overview-2.0-draft-10.pdf.
[4] Sun Microsystems, Take your business to a Higher Level -
Sun cloud computing technology scales your infrastructure
to take advantage of new business opportunities, guide, April
2009.
[5] W. Li and L. Ping, “Trust model to enhance security and
interoperability of cloud environment,” in Cloud Computing,
pp. 69–79, November 2009.
[6] N. Leavitt, “Is cloud computing really ready for prime time?,
Computer, pp. 15–20, January 2009.
[7] Liberty Alleance Project, http://projectliberty.org.
[8] OpenID Authentication 2.0, OpenID Foundation,
http://openid.net/specs/openid-attribute-exchange-2 0.html,
2007.
[9] The Shibboleth system standards, http://www.openqrm.com.
[10] Microsoft Windows Cardspace,
http://netfx3.com/content/WindowsCardspaceHome.aspx.
[11] S. Pearson, Y. Shen, and M. Mowbray, “A privacy manager
for cloud computing,” in Cloud Computing, pp. 90–106,
November 2009.
[12] B. Sotomayor, R. Montero, I. Llorente, and I. Foster, “Virtual
infrastructure management in private and hybrid clouds,
Internet Computing, IEEE, vol. 13, pp. 14–22, September
2009.
[13] OpenQRM, “the next generation, open-source Data-center
management platform”, http://www.openqrm.com/.
[14] OpenSAML, “Open source libraries in Java and C++ pro-
viding core message, binding, and profile classes for im-
plementing applications based on SAML 1.0, 1.1, and 2.0”,
http://saml.xml.org/internet2-opensaml.
[15] “Web services security: Soap message security 1.0, oasis,
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-
soap-message-security-1.0.pdf.”
... Abdo et al. [50] proposed a rearrangement of the Cross Cloud Federation Manager (CCFM) process presented by Celesti et al. In the authors' opinion the fully distributed approach followed by Celesti et al. ( [54], [55]) in performing the discovery and matchmaking processes is valid but it presents several shortcomings in terms of communication delay, overhead and reputation mechanisms. The authors' solution rearranges the CCFM in a Broker-based CCFM. ...
... Even Yeh et al. [80] work is placed in the same set of papers and its authors present a dynamic way to allocate resources across multiple Clouds in a federated environment. The basic considerations made in this work are similar to those discussed in Celesti et al. [55] (placed in the successive set of papers). Anyway the Federation here is created following the concept of Cross-IdP. ...
... A high level description of the XACML-based algorithm is provided in Celesti et al. [55]. The matchmaking selection is based on two different evaluation tasks. ...
Article
Full-text available
Nowadays Cloud computing permeates almost every domain in Information and Communications Technology (ICT) and, increasingly, most of the action is shifting from large, dominant players toward independent, heterogeneous, private/hybrid deployments, in line with an ever wider range of business models and stakeholders. The rapid growth in the numbers and diversity of small and medium Cloud providers is bringing new challenges in the as-a-Services space. Indeed, significant hurdles for smaller Cloud service providers in being competitive with the incumbent market leaders induce some innovative players to “federate” deployments in order to pool a larger, virtually limitless, set of resources across the federation , and stand to gain in terms of economies of scale and resource usage efficiency. Several are the challenges that need to be addressed in building and managing a federated environment, that may go under the “Security”, “Interoperability”, “Versatility”, “Automatic Selection” and “Scalability” labels. The aim of this paper is to present a survey about the approaches and challenges belonging to the “Automatic Selection” category. This work provides a literature review of different approaches adopted in the “Automatic and Optimal Cloud Service Provider Selection”, also covering “Federated and Multi-Cloud” environments.
... Mobile Cloud Computing (MCC) is enabled by the computation capability and storage capacity augmentation services provided by the Cloud through its resource-on-demand services [5]. Thus, it provides cost-effective access to computing assets and optimized unbounded heterogeneous computation resources that can be exploited for business opportunities [6]. Remote authentication through mobile devices is frequently employed to authenticate users for accessing MCC services. ...
Chapter
Full-text available
Remote authentication is commonly required for online transactions. Many computing activities are now done online through Cloud computing. Most of devices used to access data in the Cloud are low capacity mobile devices. The advancement of computing technology is also accompanied with increased cybercrimes. Thus, security system for securing user data online must meet up with the new wave of attacks. Many solutions for improved remote authentication have been proposed but the security of remote authentication with mobile devices is still facing challenges. This research proposes a Simple Multilevel Real User Remote Authentication Scheme (SIMP-REAUTH) for Mobile Cloud Computing to prevent misuse of authentication token. SIMP-REAUTH is designed to enable implementation of advance authentication on low memory, low capacity mobile devices for a more accurate real user identification. SIMP-REAUTH consists of three stages comprising the facial, voice, and password authentications. The authentication processes are carried out by separate modules. Failure of any of the stages will cause the system to deny the user access to data. The high capacity and memory consuming biometric processes were outsourced to the Cloud. Misuse of authentication information was prevented with liveness test challenges. The reports obtained from the test users and results of simulated attacks carried out using the testbench show that SIMP-REAUTH is well suited for mitigating authentication token misuse by identity thieves. The test results recorded 94% and 92% resistance against the facial and voice attacks tests, respectively.
... More specifically, the concept of cloud federation was pioneered by the Reservoir FP7 project over a decade ago [39]. Subsequent research proposed ways to form federation at the cloud provider level by means of a layered service model [40] and proposing a cross-cloud federation manager with discovery and authentication [41]. Other works discuss resource allocation in cloud federations [42] and architectures for federated clouds [43]. ...
Article
Full-text available
Hybrid cloud multi-access edge computing (MEC) deployments have been proposed as efficient means to support Internet of Things (IoT) applications, relying on a plethora of nodes and data. In this paper, an overview on the area of hybrid clouds considering relevant research areas is given, providing technologies and mechanisms for the formation of such MEC deployments, as well as emphasizing several key issues that should be tackled by novel approaches, especially under the 5G paradigm. Furthermore, a decentralized hybrid cloud MEC architecture, resulting in a Platform-as-a-Service (PaaS) is proposed and its main building blocks and layers are thoroughly described. Aiming to offer a broad perspective on the business potential of such a platform, the stakeholder ecosystem is also analyzed. Finally, two use cases in the context of smart cities and mobile health are presented, aimed at showing how the proposed PaaS enables the development of respective IoT applications.
Conference Paper
In this work, we present a device-based approach for a Single Sign-On (SSO) system that can be used for user authentication to web services hosted by remote servers. Our approach is based on the utilisation of intrinsic Physical Unclonable Functions (PUFs) and each user's credentials in the context of the Operating System (OS) found on the device. We examine the security and privacy benefits and deficiencies associated with the employment of the proposed SSO system for web services in general, as well as those connected with its potential deployment to the public Internet. In particular, we note that the proposed scheme is highly flexible and secure, and can not only act in a privacy-friendly manner, but also provide for total anonymity, as long as trust can be adequately established.
Article
Cloud and Edge computing paradigms provide storage and computing services to traditional and internet of Things devices. One computing platform is not suitable to fulfill the requirements of all ioT devices because of their heterogeneity. in this regard, a federation of various computing paradigms has been emerging, in which a user (first party) with an account on one computing platform (second party) can access the services provided by another computing platform (third party federated with the first computing platform). The user needs to authenticate itself with the third-party computing platform which does not have user credentials. This work proposes a transparent and standard-compliant proxy-based federated authentication for solving the third-party authentication problem in federated cloud and edge computing paradigms. Transparency allows cloud and edge operators to deploy this proxy without having to change the existing authentication protocols. Experimental results illustrate that, as compared with the concatenation of authentication protocols in cloud and edge, proxy-based federated authentication of edge-to-cloud and cloud-to-edge can reduce the authentication delay time by 27.7 percent and 37.9 percent, respectively, and it is also standard compliant.
Chapter
Nowadays, the issue of identity and access management (IAM) has become an important research topic in cloud computing. In the distributed computing environments like cloud computing, effective authentication and authorization are essential to make sure that unauthorized users do not access the resources, thereby ensuring the confidentiality, integrity, and availability of information hosted in the cloud environment. In this chapter, the authors discuss the issue of identity and access management in cloud computing, analyzing the work carried out by others in the area. Also, various issues in the current IAM scenario in cloud computing, such as authentication, authorization, access control models, identity life cycle management, cloud identity-as-a-service, federated identity management and also, the identity and access management in the inter-cloud environment are discussed. The authors conclude this chapter discussing a few research issues in the area of identity and access management in the cloud and inter-cloud environments.
Chapter
Cloud federation is paving the way toward new business scenarios in which it is possible to enforce more flexible energy management strategies than in the past. Considering independent cloud providers, each one is exclusively bound to the specific energy supplier powering its datacenter. The situation radically changes if we consider a federation of cloud providers powered by both a conventional energy supplier and a renewable energy generator. In such a context, the opportune relocation of computational workload among providers can lead to a global energy sustainability policy for the whole federation. In this work, the authors investigate the advantages and issues for the achievement of such a sustainable environment.
Article
Interconnecting the computing services of different tiers by multiple cloud providers is indispensable to overcome the exponentially increasing demands of enterprises. In view of highly dynamic and unpredictable environment, cloud providers have to face numerous challenges related to service provisioning of diversified applications while handling the critical management operations on resource layers. Proper configuration and uniform development of architectural components and protocols to setup interconnected clouds are inevitable, which play effective role in management. Various approaches have been proposed by research community to interconnect the geographically dispersed clouds to extend the capabilities of standalone provider. Fundamentally, this study encompasses the requirement factors and classification of interconnected cloud management from various aspects. Mainstream resource management elements, architectural components, and brokering protocols with respect to functional impact, which proposed in literature, have been discussed. These protocols and components play pivotal role for aggregating computing services from distinct providers and maintaining the quality of service parameters of service provisioning. Finally, the analysis of various projects is also presented to highlight the functionality of collaborated ecosystem with issues and further directions.
Article
Full-text available
Cloud Computing has become another buzzword after Web 2.0. However, there are dozens of different definitions for Cloud Computing and there seems to be no consensus on what a Cloud is. On the other hand, Cloud Computing is not a completely new concept; it has intricate connection to the relatively new but thirteen-year established Grid Computing paradigm, and other relevant technologies such as utility computing, cluster computing, and distributed systems in general. This paper strives to compare and contrast Cloud Computing with Grid Computing from various angles and give insights into the essential characteristics of both.
Article
One of the many definitions of "cloud" is that of an infrastructure-as-a-service (IaaS) system, in which IT infrastructure is deployed in a provider's data center as virtual machines. With IaaS clouds' growing popularity, tools and technologies are emerging that can transform an organization's existing infrastructure into a private or hybrid cloud. OpenNebula is an open source, virtual infrastructure manager that deploys virtualized services on both a local pool of resources and external IaaS clouds. Haizea, a resource lease manager, can act as a scheduling back end for OpenNebula, providing features not found in other cloud software or virtualization-based data center management software.
Conference Paper
We describe a privacy manager for cloud computing, which reduces the risk to the cloud computing user of their private data being stolen or misused, and also assists the cloud computing provider to conform to privacy law. We describe different possible architectures for privacy management in cloud computing; give an algebraic description of obfuscation, one of the features of the privacy manager; and describe how the privacy manager might be used to protect private metadata of online photos.
Conference Paper
Trust is one of the most important means to improve security and enable interoperability of current heterogeneous independent cloud platforms. This paper first analyzed several trust models used in large and distributed environment and then introduced a novel cloud trust model to solve security issues in cross-clouds environment in which cloud customer can choose different providers’ services and resources in heterogeneous domains can cooperate. The model is domain-based. It divides one cloud provider’s resource nodes into the same domain and sets trust agent. It distinguishes two different roles cloud customer and cloud server and designs different strategies for them. In our model, trust recommendation is treated as one type of cloud services just like computation or storage. The model achieves both identity authentication and behavior authentication. The results of emulation experiments show that the proposed model can efficiently and safely construct trust relationship in cross-clouds environment.
Article
Even though the technology faces several significant challenges, many vendors and industry observers predict a bright future for cloud computing.
Open source libraries in Java and C++ pro-viding core message, binding, and profile classes for im-plementing applications based on SAML 1.0, 1.1, and 2
  • Opensaml
OpenSAML, " Open source libraries in Java and C++ pro-viding core message, binding, and profile classes for im-plementing applications based on SAML 1.0, 1.1, and 2.0 ", http://saml.xml.org/internet2-opensaml.
the next generation, open-source Data-center management platform
  • Openqrm
OpenQRM, "the next generation, open-source Data-center management platform", http://www.openqrm.com/.
The evolution of the cloud computing market
  • T Bittman
Open source libraries in Java and C++ providing core message, binding, and profile classes for implementing applications based on SAML 1.0, 1.1, and 2.0
  • Opensaml
OpenSAML, "Open source libraries in Java and C++ providing core message, binding, and profile classes for implementing applications based on SAML 1.0, 1.1, and 2.0", http://saml.xml.org/internet2-opensaml.