A novel trusted base model for cloud computing using federated identity architecture against identity theft
Cloud computing with the many advantages and benefits has been emphasized by many enterprises. Easy access information, quick deployment, cost efficient, greater business agility are some of the cloud advantages. While ease and cost are two great benefits of cloud but Security and technical issue ar...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/48146/1/EghbalGhazizadehMFC2013.pdf http://eprints.utm.my/id/eprint/48146/ http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:81843?queryType=vitalDismax&query=A+novel+trusted+base+model+for+cloud+computing+using+federated+identity+architecture+against+identity+theft&public=true |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Malaysia |
Language: | English |
Summary: | Cloud computing with the many advantages and benefits has been emphasized by many enterprises. Easy access information, quick deployment, cost efficient, greater business agility are some of the cloud advantages. While ease and cost are two great benefits of cloud but Security and technical issue are significant problems of the cloud. This is a vital component of the cloud’s critical infrastructure. Cloud users use this environment to enable numerous online transactions crossways a widespread range of sectors and to exchange information. Especially, identity theft, online fraud, misuse of information should be addressed in the cloud. Increase level of trust is the vital key to decrease identity theft and online fraud. Therefore, cloud vendors should utilize easy-to-use, secure, and efficient identity. Strong Cloud Identity Access Management (IAM) is the best way to deploy trust relationship between users and cloud vendors to guarantee that only authorized users can access to cloud applications. Cloud Identity with Trusted Computing and Trusted Platform Module (TPM) is a strong approach promotes and defines a cloud user’s identity where Relying Parties, users, and Service Providers can trust each other. In this study, trusted Single-sign-On has been proposed to mitigate identity theft in the cloud environment. Security architecture, design, efficient identity and access management solution for cloud applications has been identified. Finally, security and efficiency of the proposed model have been evaluated and analyzed and also it has been compared with some of the existing cloud identity methods. |
---|