Role of Identity Management Systems in Cloud Computing Privacy

Full Text (PDF, 377KB), PP.25-34

Views: 0 Downloads: 0

Author(s)

Kamyab Khajehei 1,*

1. Department of Computer, Islamic Azad University - Dashtestan Branch, Borazjan, Iran

* Corresponding author.

DOI: https://doi.org/10.5815/ijeme.2017.03.03

Received: 12 Jan. 2017 / Revised: 16 Feb. 2017 / Accepted: 23 Mar. 2017 / Published: 8 May 2017

Index Terms

Cloud Computing, Identity Management, Cloud Computing Security, Cloud Computing Privacy

Abstract

These days cloud computing is a main concern for small and medium enterprises. The major concern for these enterprises is about security and privacy. This paper defines privacy and concept of identity management that may help to increase trust in the cloud environment privacy. Cloud computing brings us on-demand service by reduction of hardware costs, but it also suffers from reduction of security. Enterprises scruple to decide which provider is a proper cloud provider by understanding the different types of IDM. IDMs have a major role in applying privacy in various services in cloud computing. Thus, it is vital to have a vision about accessing resources in a secure manner. This paper focused on the SaaS (Software as a Service) and communication on cloud computing environment.

Cite This Paper

Kamyab Khajehei,"Role of Identity Management Systems in Cloud Computing Privacy", International Journal of Education and Management Engineering(IJEME), Vol.7, No.3, pp.25-34, 2017. DOI: 10.5815/ijeme.2017.03.03

Reference

[1]N. F. M. Kubach, "Identity Management and Cloud Computing in the Automotive Industry: First Empirical Results from a Quantitative Survey", In Gesellschaft für Informatik eV (GI) publishes this series in order to make available to a broad public recent findings in informatics (ie computer science and informa-tion systems), to document conferences that are organized in co-operation with GI and to publish the annual GI Award dissertation, 2015.

[2]K. Gunjan & G. Sahoo & R.K. Tiwari, "Identity Management in Cloud Computing –A Review", International Journal of Engineering Research & Technology, Vol. 1, No 4, 2012.

[3]A. Benusi, "An Identity Management Survey on Cloud Computing", International Journal of Computing and Optimization, Vol. 1, No. 2, 2014, p. 63-71.

[4]U. Habiba1 & R. Masood & M. A. Shibli & Muaz A Niazi, "Cloud identity management security issues & solutions: a taxonomy", Vol. 2, No. 1, 2014, p. 1.

[5]P. Angin & B. Bhargava & R. Ranchal & N. Singh & M. Linderman & L. B. Othmane & L. Lilien, "An entity-centric approach for privacy and identity management in cloud computing", In Reliable Distributed Systems, 2010 29th IEEE Symposium, 2010, p. 177-183.

[6]T.A. Johansen & I. Jorstad & D. Van Thanh, "Identity management in mobile ubiquitous environments", The Third International Conference on Internet Monitoring and Protection, 2008, p. 178-183.

[7]A. Gopalakrishnan, "Cloud Computing Identity Management", SETLabs Briefings, Vol. 7, No. 7, 2009, p. 45-55.

[8]S. Khatua & A. Ghosh & N. Mukherjee, "Application-centric Cloud management", Computer Systems and Applications, 9th IEEE/ACS International Conference, 2011, p. 9-15

[9]K. Ashanpreet & R. Singh, "Identity Management in Cloud Computing: Issues, Incidents and Solutions", International Journal of Scientific & Engineering Research, Vol. 6, No. 3, 2015, p. 999-1004.

[10]W. A. Alrodhan & Chris J. Mitchell, "Enhancing user authentication in claim-based identity management", In CTS, 2010, pp. 75-83.

[11]C. Yuan & L. Yang, "A survey of identity management technology", Information Theory and Information Security, 2010 IEEE international conference, 2010, p. 287-293.

[12]A. Černezel & M. Heričko, "A user-centric approach for developing mobile applications", 7th International Conference on Knowledge Management in Organizations: Service and Cloud Computing, 2013, p. 455-465. 

[13]X. Yang & L. Liu, "Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing", IGI Global, 2013, p. 172-173.

[14]A. M. Lonea & H. Tianfield & D. E. Popescu, "Identity management for cloud computing", New concepts and applications in soft computing, 2013, p. 175-199.

[15]H. Y. Huang & B. Wang & X. X. Liu & J. M. Xu, "Identity federation broker for service cloud", Proceedings of the 2010 International Conference on Service Sciences, ICSS '10, Washington, DC, USA, 2010, p. 115-120.

[16]A. Celesti & F. Tusa & M. Villari & A. Puliafito, "Security and cloud computing: Intercloud identity management infrastructure", Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), 19th IEEE International Workshop on, 2010, p. 263-265.

[17]S. Dowell & A. Barreto & J. B. Michael & M. T. Shing, "Cloud to cloud interoperability", System of Systems Engineering (SoSE), 6th International Conference, 2011, p. 258-263.

[18]E. McCallister & T. Grance & K. A. Kent, "Guide to protecting the confidentiality of personally identifiable information", US Department of Commerce, National Institute of Standards and Technology, Diane Publishing, 2010.

[19]L. Ben-Othmane & L. Lilien, "Protecting Privacy in Sensitive Data Dissemination with Active Bundles", Proc. 7th Annual Conference on Privacy, Security & Trust (PST 2009), Saint John, New Brunswick, Canada, 2009, p. 202-213.

[20]P. Angin & B. Bhargava & R. Ranchal & N. Singh & M. Linderman & L.B. Othmane & L. Lilien, "An entity-centric approach for privacy and identity management in cloud computing", Reliable Distributed Systems, 29th IEEE Symposium, 2010, p. 177-183.

[21]S. Ferdous & R. Poet, "Managing dynamic identity federations using security assertion markup", Journal of theoretical and applied electronic commerce research, Vol. 10, No. 2, 2015, p. 53-76. 

[22]C. Wise & C. Friedrich & S. Nepal & S. Chen & R. O. Sinnott, "Cloud Docs: Secure Scalable Document Sharing on Public Clouds", IEEE 8th International Conference on Cloud Computing, 2015, p. 532-539.

[23]M. Jones & J. Bradley & N. Sakimura, "Json web token (jwt)",. No. RFC 7519. 2015.

[24]D. Nuñez & I. Agudo & J. Lopez, "Privacy-Preserving Identity Management as a Service", Accountability and Security in the Cloud, 2015, p. 114-125