Virtual Identity Approaches Evaluation for Anonymous Communication in Cloud Environments
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 2
Abstract
Since the era’s of Cloud computing beginning, the Identity Management is considered as a permanent challenge especially for the hybrid IT environments that permit for many users’ applications to share the same data center depending on servers’ virtualization. This paper introduces a complete study about Identity forms in different domains and applications. Also, a performance evaluation of new approaches for Virtual Identity was done. Actually, Virtual Identity, a new terminology used in virtual environments, was introduced to enhance the anonymous communication in such types of complex networks. Based on the work analysis and motivations done through an online survey, two techniques were used to implement the Virtual Identity; Identity Based Encryption (IBE) and Pseudonym Based Encryption (PBE). Both techniques were validated using MIRACL library for security algorithms. In addition, the performance of both approaches was evaluated under different configurations and network conditions through OPNET Modeler. The results showed the impact of the number of cloud users and their locations (either local or remote) on the application response time in cloud environments using the proposed virtual identities. Moreover, Application Characterization Environment whiteboard was used to simulate the overall flow of data across different tiers from start to end of the application task for Virtual Identity creation. The results and outcomes for both methodologies showed that they are suitable paradigm for achieving high degree of security and efficiency in such sophisticated network access to many online services and applications.
Authors and Affiliations
Ibrahim A. Gomaa, Emad Abd-Elrahman, Mohamed Abid
Developing a Candidate Registration System for Zambia School Examinations using the Cloud Model
Cloud computing has in the recent past gained a lot of ground in this digital age. The use of cloud technologies in business has broken barriers in sharing information making the world one big global village. Regardless...
New Artificial Immune System Approach Based on Monoclonal Principle for Job Recommendation
Finding the best solution for an optimization problem is a tedious task, specifically in the presence of enormously represented features. When we handle a problem such as job recommendations that have a diversity of thei...
Designing Smart Sewerbot for the Identification of Sewer Defects and Blockages
Internet of thing (IoT) is a new concept where the term ‘thing’ is associated with the configurable sensors and devices no matter domestic or industrial, whereas bridging up a relationship in between these things and int...
Network Attack Classification and Recognition Using HMM and Improved Evidence Theory
In this paper, a decision model of fusion classification based on HMM-DS is proposed, and the training and recognition methods of the model are given. As the pure HMM classifier can’t have an ideal balance between each m...
Advanced Metaheuristics-based Tuning of Effective Design Parameters for Model Predictive Control Approach
This paper presents a systematic tuning approach for Model Predictive Control (MPC) parameters’ using an original LabVIEW-implementation of advanced metaheuristics algorithms. Perturbed Particle Swarm Optimization (pPSO)...