Trusted Computing Strengthens Cloud Authentication

Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Compani...

Full description

Saved in:
Bibliographic Details
Main Authors: Eghbal Ghazizadeh, Mazdak Zamani, Jamalul-lail Ab Manan, Mojtaba Alizadeh
Format: Article
Language:English
Published: Wiley 2014-01-01
Series:The Scientific World Journal
Online Access:http://dx.doi.org/10.1155/2014/260187
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832567044506124288
author Eghbal Ghazizadeh
Mazdak Zamani
Jamalul-lail Ab Manan
Mojtaba Alizadeh
author_facet Eghbal Ghazizadeh
Mazdak Zamani
Jamalul-lail Ab Manan
Mojtaba Alizadeh
author_sort Eghbal Ghazizadeh
collection DOAJ
description Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.
format Article
id doaj-art-9a9a4dae7a3b406a9b7d76d2d8356ceb
institution Kabale University
issn 2356-6140
1537-744X
language English
publishDate 2014-01-01
publisher Wiley
record_format Article
series The Scientific World Journal
spelling doaj-art-9a9a4dae7a3b406a9b7d76d2d8356ceb2025-02-03T01:02:29ZengWileyThe Scientific World Journal2356-61401537-744X2014-01-01201410.1155/2014/260187260187Trusted Computing Strengthens Cloud AuthenticationEghbal Ghazizadeh0Mazdak Zamani1Jamalul-lail Ab Manan2Mojtaba Alizadeh3Universiti Teknologi Malaysia, 54100 Kuala Lumpur, MalaysiaUniversiti Teknologi Malaysia, 54100 Kuala Lumpur, MalaysiaMIMOS Berhad, Technology Park Malaysia, 57000 Kuala Lumpur, MalaysiaUniversiti Teknologi Malaysia, 54100 Kuala Lumpur, MalaysiaCloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.http://dx.doi.org/10.1155/2014/260187
spellingShingle Eghbal Ghazizadeh
Mazdak Zamani
Jamalul-lail Ab Manan
Mojtaba Alizadeh
Trusted Computing Strengthens Cloud Authentication
The Scientific World Journal
title Trusted Computing Strengthens Cloud Authentication
title_full Trusted Computing Strengthens Cloud Authentication
title_fullStr Trusted Computing Strengthens Cloud Authentication
title_full_unstemmed Trusted Computing Strengthens Cloud Authentication
title_short Trusted Computing Strengthens Cloud Authentication
title_sort trusted computing strengthens cloud authentication
url http://dx.doi.org/10.1155/2014/260187
work_keys_str_mv AT eghbalghazizadeh trustedcomputingstrengthenscloudauthentication
AT mazdakzamani trustedcomputingstrengthenscloudauthentication
AT jamalullailabmanan trustedcomputingstrengthenscloudauthentication
AT mojtabaalizadeh trustedcomputingstrengthenscloudauthentication