Please wait a minute...
New Technology of Library and Information Service  2015, Vol. 31 Issue (2): 64-71    DOI: 10.11925/infotech.1003-3513.2015.02.09
Current Issue | Archive | Adv Search |
A Centralized Identity Authentication in the Cloud Service of Public Culture Digital Resources
Gu Jiawei1, Wang Shengqing2, Zhao Danqun1, Chen Wenguang1
1. Department of Information Management, Peking University, Beijing 100871, China;
2. Modern Education Technology Center, Peking University, Beijing 100871, China
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

[Objective] A centralized identity authentication model is raised to solve user identity management problem. [Context] In the National Public Culture Digital Platform, the identity authenticcation needs to consider the characters of the topological structure of the platform and the autonomous of the users from member libraries. [Methods] This model uses an implicit or explicit global identity and mapping relations of automomous identity in order to unify the autonomous identity of the member libraries. [Results] By this model, users don't need to remember multiple identities, member libraries can share users information and realize user-centered. New member libraries can join easily. [Conclusions] This model has certain feasibility, but it still has some problems such as the efficiency, identity disambiguation and security. It should be test and adjust when being implemented.

Key wordsPublic culture digital resources      Authentication      Cloud service     
Received: 31 July 2014      Published: 17 March 2015
:  G250.7  

Cite this article:

Gu Jiawei, Wang Shengqing, Zhao Danqun, Chen Wenguang. A Centralized Identity Authentication in the Cloud Service of Public Culture Digital Resources. New Technology of Library and Information Service, 2015, 31(2): 64-71.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2015.02.09     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2015/V31/I2/64

[1] 国家公共文化数字支撑平台2013 年度建设方案(草案)[R]. 北京: 文化部全国公共文化发展中心. 2012.
[2] Radha V, Reddy D H. A Survey on Single Sign-on Techniques[J]. Procedia Technology, 2012, 4:134-139.
[3] 房晶. 云计算的虚拟化安全和单点登录研究[D]. 北京: 北 京交通大学, 2012. (Fang Jing. Virtualization Security and Single Sign-on Research of Cloud Computing [D]. Beijing: Beijing Jiaotong University, 2012.)
[4] What is Credential Manager? [EB/OL]. [2014-06-08]. http://windows.microsoft.com/en-US/Windows7/What-is-Credentia l-Manager.
[5] eTrustTM Single Sign-on [EB/OL]. [2014-06-08]. https://supportcontent.ca.com/cadocs/0/g006742e.pdf.
[6] OASIS: Security Assertion Markup Language (SAML) V2.0 Technical Overview [EB/OL]. [2014-06-08]. http://docs.oasisopen. org/security/saml/Post2.0/sstc-saml-tech-overview-2.0-cd-02.pdf.
[7] Cantor S, Kemp J, Philpott R, et al. Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0 [R]. OASIS SSTC, 2005.
[8] SAML Single Sign-On Service for Google Apps [EB/OL].[2014-06-08]. https://developers.google.com/google-apps/sso/saml_reference_implementation?hl=zh-cn.
[9] OpenID Authentication 2.0 -Final [EB/OL]. [2014-06-08]. http://openid.net/specs/openid-authentication-2_0.html.
[10] Recordon D, Reed D. OpenID 2.0: A Platform for Usercentricidentity Management [C]. In: Proceedings of the 2nd ACM Workshop on Digital Identity Management, Alexandria, Virginia, USA. ACM, 2006: 11-16.
[11] What are Information Cards? [EB/OL]. [2014-06-08]. http://informationcard.net/quick-overview.
[12] Oppliger R. Microsoft.NET Passport and Identity Management[J]. Information Security Technical Report, 2004, 9(1): 26-34.
[13] McKiernan P. Addressing Online Identity: Understanding the Microsoft Passport Service [J]. Information Security Technical Report, 2002, 7(3): 65-80.
[14] 陈茂隆. 云计算平台下用户身份管理系统的设计与开发[D]. 天津: 天津大学, 2012. (Chen Maolong. Design and Implementation of User Identity Management System in Cloud Computing Center [D]. Tianjin: Tianjin University, 2012.)
[15] Social Login [EB/OL]. [2014-06-08]. http://janrain.com/product/social-login/.
[16] Clickpass Acquired by Janrain [EB/OL]. [2014-06-08]. http://janrain.com/clickpass-acquired-janrain/.
[17] 李安琪. 面向大型机构的身份管理与访问控制研究[D]. 长 沙: 国防科学技术大学, 2012. (Li Anqi. Research on Identity Management and Access Control for Large Organizations [D]. Changsha: National University of Defense Technology, 2012.)
[18] Shibboleth [EB/OL]. [2014-10-27]. http://www.internet2.edu/products-services/trust-identity-middleware/shibboleth/.

[1] Guang Zhu, Mining Feng. Content Authentication for Video Resources of Libraries, Museums and Archives with Semi-fragile Watermarking[J]. 数据分析与知识发现, 2016, 32(12): 76-84.
[2] Wang Weijun, Bao Liqian, Liu Kai. Development Trends of Cloud Services in Time Dimension[J]. 现代图书情报技术, 2014, 30(3): 42-48.
[3] Tang Shouli, Xu Baoxiang. Research on Ontology-based Cloud Services Semantic Retrieval System[J]. 现代图书情报技术, 2014, 30(12): 27-35.
[4] Wang Shuang, Chen Junjie, Xiao Zheng, Huang Guofan. The Application of Aliyun Search Cloud Service to Build Search Engine for Library Sites[J]. 现代图书情报技术, 2013, (6): 85-89.
[5] Ye Jian, Li Dan, Yan Xiaodi, Li Juan, Wei Qingshan, Han Meng, Xiao Xiaobo. Research and Implementation of Library WLAN Unified Authentication System[J]. 现代图书情报技术, 2012, 28(7): 121-126.
[6] Li Xin, Liu Dan. A Practice of Uniform Identity Authentication Against Multiple Authentication Sources Based on LDAP ——A Case Analysis of East China Normal University Library[J]. 现代图书情报技术, 2011, 27(4): 89-93.
[7] Wang Zexian. Design and Implementation of Unified User Authentication for VPN and ILAS III[J]. 现代图书情报技术, 2011, 27(12): 79-83.
[8] Zhu Guang, Yang Yongyue. Design of the Reading System for Card Identity Authentication Based on Image Recognition[J]. 现代图书情报技术, 2010, 26(12): 81-85.
[9] Ye Jian,Shao Jing,Yan Xiaodi . Application of WLAN Security and Network Management  Technology in University Library[J]. 现代图书情报技术, 2006, 1(7): 85-88.
[10] Xue Ji,Ma Ziwei . The Analysis and Implementation of the Relative Theory and Technology in the Information Portal of Digital Library[J]. 现代图书情报技术, 2006, 1(6): 6-10.
[11] Huang Jizheng. Design and Implement of Radius Server Using in VPN Authentication in Linux Environment[J]. 现代图书情报技术, 2005, 21(7): 22-24.
[12] Zhu Zhongming,Tang Runhuan. Application of Mobile IP to Digital Library[J]. 现代图书情报技术, 2004, 20(12): 10-13.
[13] Dong Li,Zheng Xiaohui,Jiang Airong. Research and Implementation of Resource Access Control in OCLC SiteSearch[J]. 现代图书情报技术, 2004, 20(1): 63-66.
[14] Jiang Jihong. The Network s Encryption and Authentication Technique[J]. 现代图书情报技术, 2003, 19(4): 78-80.
[15] Zhang Xiaolin. Access Management of Virtual Information Resources Systems[J]. 现代图书情报技术, 2000, 16(5): 7-11.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn