A User Identity Management Protocol for Cloud Computing Paradigm
نویسندگان
چکیده
Cloud computing paradigm is a service oriented system that delivers services to the customer at low cost. Cloud computing needs to address three main security issues: confidentiality, integrity and availability. In this paper, we propose user identity management protocol for cloud computing customers and cloud service providers. This protocol will authenticate and authorize customers/providers in other to achieve global security networks. The protocol will be developed to achieve the set global security objectives in cloud computing environments. Confidentiality, integrity and availability are the key challenges of web services’ or utility providers. A layered protocol design is proposed for cloud computing systems, the physical, networks and application layer. However, each layer will integrate existing security features such as firewalls, NIDS, NIPS, Anti-DDOS and others to prevent security threats and attacks. System vulnerability is critical to the cloud computing facilities; the proposed protocol will address this as part of measures to secure data at all levels. The protocol will protect customers/cloud service providers’ infrastructure by preventing unauthorized users to gain access to the service/facility.
منابع مشابه
Improving the Security and Usability of Cloud Services with User-centric Security Models by Saman Zarandioon
OF THE DISSERTATION Improving the security and usability of cloud services with user-centric security models by Saman Zarandioon Dissertation Director: Danfeng Yao and Vinod Ganapathy Cloud computing is a paradigm shift in the way we define software and hardware, and architect our IT solutions. The emerging cloud technologies, due to their various unique and attractive properties, are evolving ...
متن کاملRESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملTask Scheduling Algorithm Using Covariance Matrix Adaptation Evolution Strategy (CMA-ES) in Cloud Computing
The cloud computing is considered as a computational model which provides the uses requests with resources upon any demand and needs.The need for planning the scheduling of the user's jobs has emerged as an important challenge in the field of cloud computing. It is mainly due to several reasons, including ever-increasing advancements of information technology and an increase of applications and...
متن کاملPrivacy-preserving identity federations in the cloud: a proof of concept
Because of the growth in the use of cloud computing and the migration of services to this paradigm, it becomes necessary to investigate security issues that might compromise its use. Identity and Access Management is among these issues and is related to the management of users and access to their data. Federated Identity Management is widely adopted in the cloud to provide useful features to id...
متن کاملRanking CloudService Providers using SWARA and VIKOR (A case of Irancell Company)
Cloud computing is a recent computing paradigm that represents a fundamental change of information commu- nication technology (ICT) services and Cloud services continue to grow rapidly with increasing functionality and more users. As a result of this growth, it is a critical issue to select a suitable Cloud service which meets all the business strategies and the objectives of firms. This paper ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJCNS
دوره 4 شماره
صفحات -
تاریخ انتشار 2011