Consolidated Identity Management System for Secure Mobile Cloud Computing

Abstract

Privacy and security in cloud computing is an important concern for both the public and private sector. Cloud computing allows the use of internet-based services to support business process and rental of IT services on a utility-like basis. While cloud computing offers a massive concentration of resources, it poses risks for privacy preservation. The expected loss from a single breach can be significant and the heterogeneity of “users” represents an opportunity of multiple, collaborative threats. Problems associated with trusted 3rd party managed Cloud Computing stem from loss of control, lack of trust (mechanisms) and multi-tenancy. Identity management (IDM) is one of the core components in cloud privacy and security and can help alleviate some of the problems associated with cloud computing. Cloud computing requires a user-centric access control where every user’s request for any provider is accompanied with the user identity and entitlement information. The system creates digital identities for its users, and protects the users’ Personally Identifiable Information (PII). User identity has identifiers or attributes that constitute PII, which identifies and defines the user. The identity is portable although tied to a domain. This user-centric approach gives the users the ultimate control of their digital identities. We propose and validate a new IDM architecture dubbed Consolidated IDM (CIDM) that countermeasures these attacks. We discuss and propose approaches for privacy preservation in the cloud that does not use a trusted third party. The components of the proposed approach are: (i) use of active bundle—which is a middleware agent that includes data, privacy policies and a virtual machine that enforces the policies and use a set of protection mechanisms (i.e., integrity check, apoptosis, evaporation, decoy) to protect itself, as a container for PII; (ii) use of active bundle to mediates interactions between the user and cloud services using user’s privacy policies; and (ii) use of predicate over encrypted data computing when negotiating a use of a cloud service.

Authors and Affiliations

P. R. Menaka

Keywords

Related Articles

Ant Colony Optimization Algorithm

Hybrid algorithm is proposed to solve combinatorial optimization problem by using Ant Colony and Genetic programming algorithms. Evolutionary process of Ant Colony Optimization algorithm adapts genetic operations to enh...

Design and Analysis of Car Disc Brake by Using FEM

Braking is a process which converts the kinetic energy of the vehicle into mechanical energy which must be dissipated in the form of heat. The disc brake is a device for deaccelerating or stopping the rotation of a whee...

CFD Analysis of Engine Cylinder FIN

the engine cylinder is one of the major i c engine components, which is subjected to high temperature variations and thermal stresses. To cool the cylinder, fins are provided on the surface of the cylinder to increase t...

Improvement in Technologies for Assessment of Drinking Water Quality in Rural Areas of Manikpur Block in District Chitrakoot (U.P.)

Drinking water is a basic requirement for life and survival of animals and plants. Unpotable water results in many water borne diseases viz: diarrhoea, fluorosis, cholera, colitis, etc. these ailments potentially constr...

Swarm Robotics: Theoretical View on Task Allocation Material Handling Approach

Nowadays, industrial world is becoming fully or semi-automatic. So, many organizations implement automation to increase production rate and reduce lead time. Bigger organizations can easily implement conveyor belt syste...

Download PDF file
  • EP ID EP20001
  • DOI -
  • Views 303
  • Downloads 4

How To Cite

P. R. Menaka (2015). Consolidated Identity Management System for Secure Mobile Cloud Computing. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(3), -. https://www.europub.co.uk/articles/-A-20001