Identity Management issues in Cloud Computing
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 8
Abstract
Cloud computing is providing a low cost on demand services to the users, omnipresent network, large storage capacity due to these features of cloud computing web applications are moving towards the cloud and due to this migration of the web application, cloud computing platform is raised many issues like privacy, security etc. Privacy issue are major concern for the cloud computing. Privacy is to preserve the sensitive information of the cloud consumer and the major issues to the privacy are unauthorized secondary usage, lack of user control, unclear responsibility. For dealing with these privacy issues Identity management method are used. This paper discusses the privacy issue and different kind of identity management technique that are used for preserving the privacy.
Authors and Affiliations
Smita Saini , Deep Mann
An Approach for Load Balancing Among Multi-Agents to Protect Cloud Against DDos Attack
Cloud Computing is widely used technology in present era. Cloud Computing is mainly used for on demand services over the distributed servers. So it is necessary to manage the working load of participating servers for uni...
A Survey on Mobility Management Protocols for Improving Handover Performance
The wireless and mobile communication systems have enormous growth in recent years because many people use mobile devices for acquiring different services like browsing, multimedia applications and file sharing etc. Mobi...
Password-Only Authenticated Key Exchange Using Distributed Server
Authentication using Password-authenticated key exchange using distributed server (PAKEUDE) is done where a cryptographic key - exchange of messages. Database of all passwords to authenticate clients are stored in a dist...
Novel Implementation of O-Pass Security Model Design of User Authentication for Password Stealing and Reuse Attacks
Text password is the most popular form of user authentication on websites due to its convenience and simplicity. However, users’ passwords are prone to be stolen and compromised under different threats and vulnerabilitie...
Affective Embedded Systems: a Requirement Engineering Approach
This paper proposes an embedded system development process able to deal with affectivity requirements. This process includes W3C tools, such as EmotionML and SysML, in order to specify cognition and affectivity as system...