scispace - formally typeset
Open AccessProceedings Article

Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth

Reads0
Chats0
TLDR
The objective of this work is to provide identity management, based on digital identity federation, with authentication and authorization mechanisms for access control in cloud computing environments to independent, trusted third-parties.
Abstract
The services provided in clouds may represent an increase in the efficiency and effectiveness in the operations of the enterprise business, improving the cost-effectiveness related to services and resources consumption. However, there is concern about the privacy of data, since such data are outside the client's domain. For these services to be effectively enjoyed by organizations it is necessary to provide access control. The objective of this work is to provide identity management, based on digital identity federation, with authentication and authorization mechanisms for access control in cloud computing environments to independent, trusted third-parties. Keywords-cloud computing; identity management; multi- tenancy; federation; Shibboleth; access control; authentication; authorization.

read more

Citations
More filters
Journal ArticleDOI

A survey of emerging threats in cybersecurity

TL;DR: An overview of the most exploited vulnerabilities in existing hardware, software, and network layers is presented and critiques of existing state-of-the-art mitigation techniques as why they do or don't work are described.
Journal ArticleDOI

Cloud Computing Security: A Survey

TL;DR: This work identifies cloud vulnerabilities, classify known security threats and attacks, and presents the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks.
Journal ArticleDOI

A survey of security issues for cloud computing

TL;DR: A survey of security issues in terms of security threats and their remediations is presented and a parametric comparison of the threats being faced by cloud platforms is performed.
Journal ArticleDOI

Consolidated Identity Management System for secure mobile cloud computing

TL;DR: It is shown that the current IDMs are vulnerable to three attacks, namely – IDM server compromise, mobile device compromise, and network traffic interception, and a new IDM architecture dubbed Consolidated IDM (CIDM) is proposed and validated that countermeasures these attacks.
Proceedings ArticleDOI

Security and Privacy of Sensitive Data in Cloud Computing: A Survey of Recent Developments

TL;DR: The existing technologies and a wide array of both earlier and state-of-the-art projects on cloud security and privacy are reviewed, in addition to reviewing the existing developments in privacy-preserving sensitive data approaches in cloud computing such as privacy threat modeling and privacy enhancing protocols and solutions.
References
More filters
Journal ArticleDOI

A view of cloud computing

TL;DR: The clouds are clearing the clouds away from the true potential and obstacles posed by this computing capability.
Journal ArticleDOI

Understanding Cloud Computing Vulnerabilities

TL;DR: Four indicators of cloud-specific vulnerabilities are defined, a security-specific cloud reference architecture is introduced, and examples of cloud -specific vulnerabilities for each architectural component are provided.
Book ChapterDOI

Federated Identity Management

TL;DR: This paper addresses the topic of federated identity management and discusses in detail the following topics: what is digital identity, what is identity management, how can the authors protect the user's privacy in a federated environment, levels of assurance, some past and present federate identity management systems, and some current research in FIM.
Proceedings ArticleDOI

Services in the Cloud Computing era: A survey

TL;DR: Six categories of Cloud Computing services are divided into six categories and detailed analysis to these services are provided, as well as those companies which provide the corresponding service categories.
Proceedings ArticleDOI

User centricity: a taxonomy and open issues

TL;DR: This work investigates the existence of a universal user-centric FIM system that can achieve a superset of security and privacy properties as well as the characteristic features of both pre-dominant classes and explores the feasibility of reaching beyonduser-centricity.
Related Papers (5)