ABSTRACT

Authentication and authorization are fundamental capabilities needed by most systems, especially by cloud-based systems. The Internet is a hostile environment, with many hackers and ill-purposed introducers wandering around like sharks looking for victims. In terms of figuring out ways to attack, they are very creative and determined. Unfortunately, to create an efficient, reliable, and easy-to-use authentication and authorization system requires deep knowledge on network security and rich experience in antihacking techniques. Obviously, this is beyond the capability of most cloud service developers. Then, what is the solution?