A novel trusted base model for cloud computing using federated identity architecture against identity theft

Cloud computing with the many advantages and benefits has been emphasized by many enterprises. Easy access information, quick deployment, cost efficient, greater business agility are some of the cloud advantages. While ease and cost are two great benefits of cloud but Security and technical issue ar...

Full description

Saved in:
Bibliographic Details
Main Author: Ghazizadeh, Eghbal
Format: Thesis
Language:English
Published: 2013
Subjects:
Online Access:http://eprints.utm.my/id/eprint/48146/1/EghbalGhazizadehMFC2013.pdf
http://eprints.utm.my/id/eprint/48146/
http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:81843?queryType=vitalDismax&query=A+novel+trusted+base+model+for+cloud+computing+using+federated+identity+architecture+against+identity+theft&public=true
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
Language: English
Description
Summary:Cloud computing with the many advantages and benefits has been emphasized by many enterprises. Easy access information, quick deployment, cost efficient, greater business agility are some of the cloud advantages. While ease and cost are two great benefits of cloud but Security and technical issue are significant problems of the cloud. This is a vital component of the cloud’s critical infrastructure. Cloud users use this environment to enable numerous online transactions crossways a widespread range of sectors and to exchange information. Especially, identity theft, online fraud, misuse of information should be addressed in the cloud. Increase level of trust is the vital key to decrease identity theft and online fraud. Therefore, cloud vendors should utilize easy-to-use, secure, and efficient identity. Strong Cloud Identity Access Management (IAM) is the best way to deploy trust relationship between users and cloud vendors to guarantee that only authorized users can access to cloud applications. Cloud Identity with Trusted Computing and Trusted Platform Module (TPM) is a strong approach promotes and defines a cloud user’s identity where Relying Parties, users, and Service Providers can trust each other. In this study, trusted Single-sign-On has been proposed to mitigate identity theft in the cloud environment. Security architecture, design, efficient identity and access management solution for cloud applications has been identified. Finally, security and efficiency of the proposed model have been evaluated and analyzed and also it has been compared with some of the existing cloud identity methods.