Open AccessProceedings Article
Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth
Marcos Aurélio Pedroso Leandro,Tiago Jaime Nascimento,Daniel Ricardo dos Santos,Carla Merkle Westphall,Carlos Becker Westphall +4 more
- pp 88-93
Reads0
Chats0
TLDR
The objective of this work is to provide identity management, based on digital identity federation, with authentication and authorization mechanisms for access control in cloud computing environments to independent, trusted third-parties.Abstract:
The services provided in clouds may represent an increase in the efficiency and effectiveness in the operations of the enterprise business, improving the cost-effectiveness related to services and resources consumption. However, there is concern about the privacy of data, since such data are outside the client's domain. For these services to be effectively enjoyed by organizations it is necessary to provide access control. The objective of this work is to provide identity management, based on digital identity federation, with authentication and authorization mechanisms for access control in cloud computing environments to independent, trusted third-parties. Keywords-cloud computing; identity management; multi- tenancy; federation; Shibboleth; access control; authentication; authorization.read more
Citations
More filters
Journal ArticleDOI
A survey of emerging threats in cybersecurity
Julian Jang-Jaccard,Surya Nepal +1 more
TL;DR: An overview of the most exploited vulnerabilities in existing hardware, software, and network layers is presented and critiques of existing state-of-the-art mitigation techniques as why they do or don't work are described.
Journal ArticleDOI
Cloud Computing Security: A Survey
TL;DR: This work identifies cloud vulnerabilities, classify known security threats and attacks, and presents the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks.
Journal ArticleDOI
A survey of security issues for cloud computing
TL;DR: A survey of security issues in terms of security threats and their remediations is presented and a parametric comparison of the threats being faced by cloud platforms is performed.
Journal ArticleDOI
Consolidated Identity Management System for secure mobile cloud computing
TL;DR: It is shown that the current IDMs are vulnerable to three attacks, namely – IDM server compromise, mobile device compromise, and network traffic interception, and a new IDM architecture dubbed Consolidated IDM (CIDM) is proposed and validated that countermeasures these attacks.
Proceedings ArticleDOI
Security and Privacy of Sensitive Data in Cloud Computing: A Survey of Recent Developments
Ali Gholami,Erwin Laure +1 more
TL;DR: The existing technologies and a wide array of both earlier and state-of-the-art projects on cloud security and privacy are reviewed, in addition to reviewing the existing developments in privacy-preserving sensitive data approaches in cloud computing such as privacy threat modeling and privacy enhancing protocols and solutions.
References
More filters
Journal ArticleDOI
A view of cloud computing
Michael Armbrust,Armando Fox,Rean Griffith,Anthony D. Joseph,Randy H. Katz,Andy Konwinski,Gunho Lee,David A. Patterson,Ariel Rabkin,Ion Stoica,Matei Zaharia +10 more
TL;DR: The clouds are clearing the clouds away from the true potential and obstacles posed by this computing capability.
Journal ArticleDOI
Understanding Cloud Computing Vulnerabilities
TL;DR: Four indicators of cloud-specific vulnerabilities are defined, a security-specific cloud reference architecture is introduced, and examples of cloud -specific vulnerabilities for each architectural component are provided.
Book ChapterDOI
Federated Identity Management
TL;DR: This paper addresses the topic of federated identity management and discusses in detail the following topics: what is digital identity, what is identity management, how can the authors protect the user's privacy in a federated environment, levels of assurance, some past and present federate identity management systems, and some current research in FIM.
Proceedings ArticleDOI
Services in the Cloud Computing era: A survey
TL;DR: Six categories of Cloud Computing services are divided into six categories and detailed analysis to these services are provided, as well as those companies which provide the corresponding service categories.
Proceedings ArticleDOI
User centricity: a taxonomy and open issues
TL;DR: This work investigates the existence of a universal user-centric FIM system that can achieve a superset of security and privacy properties as well as the characteristic features of both pre-dominant classes and explores the feasibility of reaching beyonduser-centricity.