CFP last date
20 January 2025
Reseach Article

Identity Management Frameworks for Cloud

by Roshni Bhandari, Upendra Bhoi, Dhiren Patel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 83 - Number 12
Year of Publication: 2013
Authors: Roshni Bhandari, Upendra Bhoi, Dhiren Patel
10.5120/14501-2310

Roshni Bhandari, Upendra Bhoi, Dhiren Patel . Identity Management Frameworks for Cloud. International Journal of Computer Applications. 83, 12 ( December 2013), 25-31. DOI=10.5120/14501-2310

@article{ 10.5120/14501-2310,
author = { Roshni Bhandari, Upendra Bhoi, Dhiren Patel },
title = { Identity Management Frameworks for Cloud },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 83 },
number = { 12 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 25-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume83/number12/14501-2310/ },
doi = { 10.5120/14501-2310 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:59:11.749692+05:30
%A Roshni Bhandari
%A Upendra Bhoi
%A Dhiren Patel
%T Identity Management Frameworks for Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 83
%N 12
%P 25-31
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a new trend of computing paradigm that provides a set of scalable resources on demand. However, it also being a target of cyber attacks and creates risk for data privacy and protection. An Identity Management System (IDM) supports the management of multiple digital identities for authentication and authorization. This paper reviews various identity management frameworks that help making Cloud environment more secure.

References
  1. Mell, P. , and Grance, T. 2011. The nist definition of Cloud computing (draft), NIST. [Online]. avilable: http://csrc. nist. gov/publications/drafts/800-145/Draft-SP-800-145_Cloud-definition. pdf.
  2. Bhavesh, B. , Patel, A. , Patel, D. R. and Patel, H. 2012. Incorporating honeypot for intrusion detection in Cloud infrastructure. In Proceedings of the 6th International Conference on Trust Management.
  3. Angin, P. , Bhargava, B. , Ranchal, R. , Singh, N. , Linderman, M. , Othmane, L. Ben and Lilien, L. 2010. An entity-centric approach for privacy and identity management in Cloud computing. In Proceedings of the 29th IEEE Symposiumon. IEEE in Reliable Distributed System.
  4. Wikipedia. 2010. Identity management systems. [Online]. avilable:http://en. wikipedia. org/wiki/Identity_management_systems.
  5. The Laws of identity. [Online]. avilable: http://msdn. microsoft. com/en-us/library/ms996456. aspx.
  6. king, C. and Perkins, C. 2013. The role of identity management in information security: part 1-The planning view. [Online]. avilable: www. znet. com.
  7. A. Gopalkrishnn, "Cloud Computing Identity Management", Journal of SETLabs Briefings, 2009, Vol. 7, No. 7, pp. 45-54.
  8. Gellman, R. 2009. Privacy in the Clouds: risks to Privacy and Confidentiality from loud, World Privacy Forum.
  9. Telecom Review. 2011. Importance of identity management in Cloud. [Online]. Available: http://telecomreviewna. com/index. php?option=com_content&view=article&id=92:importance-of-identity-management-in-Cloud-computing&catid=37:november-december-2011-issue&Itemid=73.
  10. Identity and Access Management: IAM Architecture and Practice. [Online]. Available: http://mscerts. net/image/201011/IAM%20Architecture%20and%20Practice_2. jpg.
  11. K. D. Lewis, and J. E. Lewis, "Web single sign-on authentication using SAML", International Journal of Computer Science Issues, 2009, Vol. 2, pp. 41-48.
  12. J. Somorovsky, A. Mayer, A. Worth, J. Schwenk, M. Kampmann, and M. Jensen, "On breaking SAML: Be whoever you want to be," In WOOT, 2012.
  13. Cantor, S. , Kemp, J. , Champagne, D. , Aarts, R. , and Kavsan, B. Liberty ID-FF Bindings and Profiles Specification, Version: 1. 2-errata-v2. 0. [Online]. Available: www. projectliberty. org.
  14. Dwiputera, A. F. , and Ruppa, I. S. 2012. Single sign-on architecture in public networks (Liberty Alliance). In Proceedings of the INFOTECH seminar on advanced communication Services (ACS).
  15. Bhargava, B. , Singh, N. , and Sinclair,Asher. 2011. Privacy in Cloud Computing Through Identity Management. Technical Report. Computer Science, Purdue University.
  16. Camenisch, J. , Shelat, A. , Sommer, D. , Fischer-HÄubner, S. , Hansen, M. , Krasemann, H. , Lacoste, G. , Leenes, R. , and Tseng, J. 2005. Privacy and identity management for everyone. In Proceedings of the Workshop on Digital Identity Management.
  17. Nunez, D. , Agudo, I. , and Lopez, J. 2012. Integrating openid with proxy re-encryption to enhance privacy in Cloud-based identity services. In Proceedings of theIEEE 4th International Conference on Cloud Computing Technologyand Science (CloudCom).
  18. Hueniverse Beginner's Guide to OAuth. [Online]. Available: http://hueniverse. com/2007/10/beginners-guide-to-oauth-part-ii-protocol-workflow
  19. OneLogin. [Online]. Available: http://www. justinpirie. com/2010/03/onelogin-saas-app-review-1-the-good-bad-and-ugly.
  20. Windows Identity Foundation. [Online]. Available: http://en. wikipedia. org/wiki/Windows_Identity_Foundation.
  21. Single-Sign-On. [Online]. Available: http://en. wikipedia. org/wiki/Single_sign-on.
Index Terms

Computer Science
Information Sciences

Keywords

Single-Sign-On (SSO) Identity and Access Management Personal identifiable information (PII) identity federation management provisioning de-provisioning