Consolidated Identity Management System for Secure Mobile Cloud Computing
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 3
Abstract
Privacy and security in cloud computing is an important concern for both the public and private sector. Cloud computing allows the use of internet-based services to support business process and rental of IT services on a utility-like basis. While cloud computing offers a massive concentration of resources, it poses risks for privacy preservation. The expected loss from a single breach can be significant and the heterogeneity of “users” represents an opportunity of multiple, collaborative threats. Problems associated with trusted 3rd party managed Cloud Computing stem from loss of control, lack of trust (mechanisms) and multi-tenancy. Identity management (IDM) is one of the core components in cloud privacy and security and can help alleviate some of the problems associated with cloud computing. Cloud computing requires a user-centric access control where every user’s request for any provider is accompanied with the user identity and entitlement information. The system creates digital identities for its users, and protects the users’ Personally Identifiable Information (PII). User identity has identifiers or attributes that constitute PII, which identifies and defines the user. The identity is portable although tied to a domain. This user-centric approach gives the users the ultimate control of their digital identities. We propose and validate a new IDM architecture dubbed Consolidated IDM (CIDM) that countermeasures these attacks. We discuss and propose approaches for privacy preservation in the cloud that does not use a trusted third party. The components of the proposed approach are: (i) use of active bundle—which is a middleware agent that includes data, privacy policies and a virtual machine that enforces the policies and use a set of protection mechanisms (i.e., integrity check, apoptosis, evaporation, decoy) to protect itself, as a container for PII; (ii) use of active bundle to mediates interactions between the user and cloud services using user’s privacy policies; and (ii) use of predicate over encrypted data computing when negotiating a use of a cloud service.
Authors and Affiliations
P. R. Menaka
Securing The Data in Cloud Storage Using Cryptosystem Along With Stegnography
Cloud Computing is a highly developing technology where user data (both critical and non-critical) is shared on a centralized server. The sharing of the user’s critical data on a third party cloud server does not guaran...
Hydro processing Of Bio Oils, Effect Of Parameters – A Review
Rising energy demands and growing environmental concerns coupled with decline in petroleum reserves has stimulated the growth of bio fuels, an alternative to conventional fuel. This uses renewable oil derived from bioma...
Weight Reduction and Strengthening Of RC Beam Using CFRP and GFRP Layers by ANSYS 15.0
The current paper focuses on the study of RC beam with FRP as external layers. CFRP and GFRP as FRP materials are considered during the current work to study their behaviour on the deformation, strain and weight by mean...
A Novel Design of Low Power Comparator through Differential Amplifier in 90nm CMOS Technology Using Cadence Tool
In digital world, Speed, area, power are very vital parameters for high speed devices like analog to digital converters. The comparator circuit with preamplifier increases the power consumption, as it requires large amo...
Extraction of Information from Web Page Using Content Mining Approach
Today internet has made the life of human dependent on it. Almost everything and anything can be searched on net. The rapid growth of World Wide Web has been tremendous in recent years. With the large amount of informa...