CFP last date
20 January 2025
Reseach Article

Secure Inter-Cloud Federated Identity Management using IID

by Monika K. Katwe, Manish M. Potey
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 3
Year of Publication: 2015
Authors: Monika K. Katwe, Manish M. Potey
10.5120/ijca2015906924

Monika K. Katwe, Manish M. Potey . Secure Inter-Cloud Federated Identity Management using IID. International Journal of Computer Applications. 130, 3 ( November 2015), 6-13. DOI=10.5120/ijca2015906924

@article{ 10.5120/ijca2015906924,
author = { Monika K. Katwe, Manish M. Potey },
title = { Secure Inter-Cloud Federated Identity Management using IID },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 3 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 6-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number3/23187-2015906924/ },
doi = { 10.5120/ijca2015906924 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:24:01.371456+05:30
%A Monika K. Katwe
%A Manish M. Potey
%T Secure Inter-Cloud Federated Identity Management using IID
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 3
%P 6-13
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The proposed system support single sign on in inter-cloud environment where user can manage in different cloud environments and provide single set of credential to access different Saas cloud application provided by different cloud service provider without re-authentication. Single sign on defines the ability to authenticate only once in a distributed network and to access several protected services and resources without re-authentication. To achieve this feature the system support federated identity management system. The federated identity management system crosses organizational boundaries. To manage identities of user in this case, a cooperative contract need to be set up between multiple identity providers, using a centralized approach. The proposed system uses third party auditor or third cloud to synchronize the identities of user among different clouds. As the user data are transferred or exchanged between different clouds environment the chances of stealing the data is increased. To avoid this the system is secure from some attacks like identity theft, denial of service etc. and also secure channel is maintained to transfer/exchange information between different clouds.

References
  1. “Federated Identity Management in Cross-Cloud Environment” by Monika K. Katwe, Manish Potey, International Journal of Advanced Computing And Electronics Technology (IJACET) of Volume-2, Issue-3, 5th may 2015. http://troindia.in/journal/ijacet/Vol2_Iss3.html
  2. “Secure Inter-cloud SSO (SSO) using IIDs” by Bernd wattendorfer, Arne Tauber E-Government Innovation Center (EGlZ) Graz University of Technology Graz, Austria.
  3. “SSO For Cloud” by Pratap Murukutla National Institute of Technology,Karnataka, K.C. Shet National Institute of Technology,Karnataka.
  4. “Identity management based security architecture of cloud computing on multi-agent systems” by R.M. Lguliev Institute of Information Technology ANAS Baku, Azerbaijan, F.C. Abdullayeva Institute of Information Technology ANAS Baku, Azerbaijan.
  5. Balasubramaniam, S.; Lewis, G.A.; Morris, E.; Simanta, S.; Smith, D.B., "Identity management and its impact on federation in a system-of-systems context," Systems Conference, 2009 3rd Annual IEEE , vol., no., pp.179,182, 23-26 March 2009 doi: 10.1109/SYSTEMS.2009.4815794
  6. Khan, R.H.; Ylitalo, J.; Ahmed, A.S., "OpenID authentication as a service in OpenStack," Information Assurance and Security (IAS), 2011 7th International Conference on  ,vol., no., pp.372, 377 ,5-8Dec. 2011 doi: 10.1109/ISIAS.2011.6122782.
  7. Fatemi Moghaddam, F.; Karimi, O.; Hajivali, M., "Applying a SSO algorithm based on cloud computing concepts for SaaS applications," Communications (MICC), 2013 IEEE Malaysia International Conference on , vol., no., pp.335,339, 26-28 Nov. 2013 doi: 10.1109/MICC.2013.6805850
  8. Ghazizadeh, E.; Zamani, M.; Ab Manan, J.-L.; Khaleghparast, R.; Taherian, A., "A trust based model for federated identity architecture to mitigate identity theft," Internet Technology And Secured Transactions, 2012 International Conference for , vol., no., pp.376,381, 10-12 Dec. 2012
  9. Dreo, G.; Golling, M.; Hommel, W.; Tietze, F., "ICEMAN: An architecture for secure federated inter-cloud identity management," Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on , vol., no., pp.1207,1210, 27-31 May 2013.
Index Terms

Computer Science
Information Sciences

Keywords

SSO Authorization Authentication Re-authentication Cloud environment IID Electronic identification Federated identity management Identity federation.