We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Identity Management in Cloud Computing

by Rizwana Shaikh, M. Sasikumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 11
Year of Publication: 2013
Authors: Rizwana Shaikh, M. Sasikumar
10.5120/10509-5467

Rizwana Shaikh, M. Sasikumar . Identity Management in Cloud Computing. International Journal of Computer Applications. 63, 11 ( February 2013), 17-19. DOI=10.5120/10509-5467

@article{ 10.5120/10509-5467,
author = { Rizwana Shaikh, M. Sasikumar },
title = { Identity Management in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 11 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 17-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number11/10509-5467/ },
doi = { 10.5120/10509-5467 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:14:02.315956+05:30
%A Rizwana Shaikh
%A M. Sasikumar
%T Identity Management in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 11
%P 17-19
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing offers a rich set of services by pay per use basis. The features and technology offered by various providers created a great competitive market for the business. The various security issues are attracting attention, one of which is identity and privacy of the cloud user. Users are varied about the privacy of information which they have given to the provider at the time of registration. We present an analysis of various identity management systems and proposing a simple trust based scheme for a cloud computing application and service.

References
  1. Kathy Bergsma (University of Florida) on September 23, 2009.
  2. Lothar Fritsch & Kristin Skeide Fuglerud & Ivar Solheim "Towards inclusive identity management", October 2010, Springerlink. com.
  3. David G. W. Birch, "Psychic ID: A blueprint for a modern national identity scheme", Identity Journal Limited 2009.
  4. Sébastien Canard • Eric Malville • Jacques Traoré, "A client-side approach for privacy-preserving identity federation", Identity Journal Limited 2009.
  5. Yang Zhang and Jun-Liang Chen, "A Delegation Solution for Universal Identity Management in SOA", Computing, Vol 4, No 1, January-March 2011.
  6. R. Sánchez et al. , "Enhancing Privacy and Dynamic Federation in IdM for Consumer Cloud Computing", 96 IEEE Transactions on Consumer Electronics, Vol. 58, No. 1, February 2012.
  7. Rohit Ranchal et al, "Protection of Identity Information in Cloud Computing without Trusted Third Party", 29th IEEE International Symposium on Reliable Distributed Systems, 2010.
  8. Carl A. Gunter et al," Experience-Based Access Management, A Life-Cycle Framework for Identity and Access Management Systems" IEEE Computer and Reliability Societies,2011.
  9. David W. et al, "Attribute Aggregation in Federated Identity Management",IEEE Computer Society, May 2009.
  10. Paul Madsen and Hiroki Itoh, "Challenges To Supporting Federated Assurance", IEEE Computer Society, 2009.
  11. Alessandro Acquisti, "Identity M anagement, Privacy, and Price D iscrimination", IEEE Computer Society, 2008.
  12. Daniel J. Weitzner, "In Search of Manageable Identity Systems" IEEE Computer Society, 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Identity Identity management System Trust