Trusted Computing Strengthens Cloud Authentication
Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Compani...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2014-01-01
|
Series: | The Scientific World Journal |
Online Access: | http://dx.doi.org/10.1155/2014/260187 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832567044506124288 |
---|---|
author | Eghbal Ghazizadeh Mazdak Zamani Jamalul-lail Ab Manan Mojtaba Alizadeh |
author_facet | Eghbal Ghazizadeh Mazdak Zamani Jamalul-lail Ab Manan Mojtaba Alizadeh |
author_sort | Eghbal Ghazizadeh |
collection | DOAJ |
description | Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model. |
format | Article |
id | doaj-art-9a9a4dae7a3b406a9b7d76d2d8356ceb |
institution | Kabale University |
issn | 2356-6140 1537-744X |
language | English |
publishDate | 2014-01-01 |
publisher | Wiley |
record_format | Article |
series | The Scientific World Journal |
spelling | doaj-art-9a9a4dae7a3b406a9b7d76d2d8356ceb2025-02-03T01:02:29ZengWileyThe Scientific World Journal2356-61401537-744X2014-01-01201410.1155/2014/260187260187Trusted Computing Strengthens Cloud AuthenticationEghbal Ghazizadeh0Mazdak Zamani1Jamalul-lail Ab Manan2Mojtaba Alizadeh3Universiti Teknologi Malaysia, 54100 Kuala Lumpur, MalaysiaUniversiti Teknologi Malaysia, 54100 Kuala Lumpur, MalaysiaMIMOS Berhad, Technology Park Malaysia, 57000 Kuala Lumpur, MalaysiaUniversiti Teknologi Malaysia, 54100 Kuala Lumpur, MalaysiaCloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.http://dx.doi.org/10.1155/2014/260187 |
spellingShingle | Eghbal Ghazizadeh Mazdak Zamani Jamalul-lail Ab Manan Mojtaba Alizadeh Trusted Computing Strengthens Cloud Authentication The Scientific World Journal |
title | Trusted Computing Strengthens Cloud Authentication |
title_full | Trusted Computing Strengthens Cloud Authentication |
title_fullStr | Trusted Computing Strengthens Cloud Authentication |
title_full_unstemmed | Trusted Computing Strengthens Cloud Authentication |
title_short | Trusted Computing Strengthens Cloud Authentication |
title_sort | trusted computing strengthens cloud authentication |
url | http://dx.doi.org/10.1155/2014/260187 |
work_keys_str_mv | AT eghbalghazizadeh trustedcomputingstrengthenscloudauthentication AT mazdakzamani trustedcomputingstrengthenscloudauthentication AT jamalullailabmanan trustedcomputingstrengthenscloudauthentication AT mojtabaalizadeh trustedcomputingstrengthenscloudauthentication |