Trusted computing strengthens cloud authentication

Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Compani...

Full description

Saved in:
Bibliographic Details
Main Authors: Ghazizadeh, Eghbal, Zamani, Mazdak, Ab. Manan, Jamalul Lail, Alizadeh, Mojtaba
Format: Article
Published: Scientific World Ltd. 2014
Subjects:
Online Access:http://eprints.utm.my/id/eprint/63136/
http://dx.doi.org/10.1155/2014/260187
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
id my.utm.63136
record_format eprints
spelling my.utm.631362017-06-15T01:54:24Z http://eprints.utm.my/id/eprint/63136/ Trusted computing strengthens cloud authentication Ghazizadeh, Eghbal Zamani, Mazdak Ab. Manan, Jamalul Lail Alizadeh, Mojtaba QA75 Electronic computers. Computer science Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in.Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model. Scientific World Ltd. 2014 Article PeerReviewed Ghazizadeh, Eghbal and Zamani, Mazdak and Ab. Manan, Jamalul Lail and Alizadeh, Mojtaba (2014) Trusted computing strengthens cloud authentication. Scientific World Journal . ISSN 1537-744X http://dx.doi.org/10.1155/2014/260187 DOI:10.1155/2014/260187
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Ghazizadeh, Eghbal
Zamani, Mazdak
Ab. Manan, Jamalul Lail
Alizadeh, Mojtaba
Trusted computing strengthens cloud authentication
description Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in.Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.
format Article
author Ghazizadeh, Eghbal
Zamani, Mazdak
Ab. Manan, Jamalul Lail
Alizadeh, Mojtaba
author_facet Ghazizadeh, Eghbal
Zamani, Mazdak
Ab. Manan, Jamalul Lail
Alizadeh, Mojtaba
author_sort Ghazizadeh, Eghbal
title Trusted computing strengthens cloud authentication
title_short Trusted computing strengthens cloud authentication
title_full Trusted computing strengthens cloud authentication
title_fullStr Trusted computing strengthens cloud authentication
title_full_unstemmed Trusted computing strengthens cloud authentication
title_sort trusted computing strengthens cloud authentication
publisher Scientific World Ltd.
publishDate 2014
url http://eprints.utm.my/id/eprint/63136/
http://dx.doi.org/10.1155/2014/260187
_version_ 1643655629973225472