Consolidated Identity Management System for Secure Mobile Cloud Computing
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 3
Abstract
Privacy and security in cloud computing is an important concern for both the public and private sector. Cloud computing allows the use of internet-based services to support business process and rental of IT services on a utility-like basis. While cloud computing offers a massive concentration of resources, it poses risks for privacy preservation. The expected loss from a single breach can be significant and the heterogeneity of “users” represents an opportunity of multiple, collaborative threats. Problems associated with trusted 3rd party managed Cloud Computing stem from loss of control, lack of trust (mechanisms) and multi-tenancy. Identity management (IDM) is one of the core components in cloud privacy and security and can help alleviate some of the problems associated with cloud computing. Cloud computing requires a user-centric access control where every user’s request for any provider is accompanied with the user identity and entitlement information. The system creates digital identities for its users, and protects the users’ Personally Identifiable Information (PII). User identity has identifiers or attributes that constitute PII, which identifies and defines the user. The identity is portable although tied to a domain. This user-centric approach gives the users the ultimate control of their digital identities. We propose and validate a new IDM architecture dubbed Consolidated IDM (CIDM) that countermeasures these attacks. We discuss and propose approaches for privacy preservation in the cloud that does not use a trusted third party. The components of the proposed approach are: (i) use of active bundle—which is a middleware agent that includes data, privacy policies and a virtual machine that enforces the policies and use a set of protection mechanisms (i.e., integrity check, apoptosis, evaporation, decoy) to protect itself, as a container for PII; (ii) use of active bundle to mediates interactions between the user and cloud services using user’s privacy policies; and (ii) use of predicate over encrypted data computing when negotiating a use of a cloud service.
Authors and Affiliations
P. R. Menaka
Numerical and Buckling Analysis of Composite Hybrid Propeller Shaft
Composites structures have many advantages because of higher stiffness and strength of composite materials. This work deals with the replacement of conventional steel drive shafts with a hybrid aluminium/carbon fibre pr...
Effect of Degassing and Heat Treatment on Microstructure and Mechanical Properties of A356.0
In this present research study, A356.0 was systematically studied on mechanical properties in order to establish the database for further investigation in degassing, heat treatment and microstructure. Because of specifi...
Effect of Non Linear Impairments on Different Optical Fibers
In this paper the analysis of stimulated raman scattering induced crosstalk has been discussed. The expression for SRS induced crosstalk have been observed at different fiber types such as single mode fiber, dispersion...
Analysis in household waste collection performance indicators: case of study borough El Bousten, commun of Sfax, Tunisia
Solid waste management is a challenge for the municipalities in developing countries mainly due to the increasing generation of waste, without planning. The present work focus on the analysis of collection’s sectors of...
Reversible Data Hiding In Encrypted Images by Reserving Room before Encryption
Reversible data hiding (RDH) in images is a technique, by which the original cover can be lossless recovered after the embedded message is extracted. This important technique is widely used in medical imagery, military...