Enhancing the Access Privacy of IDaaS System Using SAML Protocol in Fog Computing

Fog environment adoption rate is increasing day by day in the industry. Unauthorized accessing of data occurs due to the preservation of Identity and information of the users either at the endpoints or at the middleware. This paper proposes a methodology to protect and preserve the Identity during data transmission of the users. It uses fog computing for storage against security issues in the cloud and database environment. Cloud and database architectures failed to protect the data and Identity of users but the Fog computing based Identity management as a service (IDaaS) system can handle it with Security Assertion Mark-up Language (SAML) protocol and Pentatope based Elliptic Curve Crypto cipher. A detailed comparative study of the proposed and existing techniques is investigated by considering multi-authentication dialogue, security services, service providers, Identity, and access management.

[1]  Vidhyacharan Bhaskar,et al.  Encrypted token based authentication with adapted SAML technology for cloud web services , 2017, J. Netw. Comput. Appl..

[2]  Rajkumar Buyya,et al.  Next generation cloud computing: New trends and research directions , 2017, Future Gener. Comput. Syst..

[3]  Muhammad Tariq,et al.  Light-Weight Security and Blockchain Based Provenance for Advanced Metering Infrastructure , 2019, IEEE Access.

[4]  Chin-Chen Chang,et al.  Privacy preserving weighted similarity search scheme for encrypted data , 2019, IET Inf. Secur..

[5]  Zeeshan Ali,et al.  Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles , 2020, IEEE Access.

[6]  Rengarajan Amirtharajan,et al.  DNA and Chaos Based Confusion-Diffusion for Color Image Security , 2019, 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN).

[7]  Ch. Rupa,et al.  Intensifying Multimedia Information Security Using Comprehensive Cipher , 2019, 2019 Innovations in Power and Advanced Computing Technologies (i-PACT).

[8]  Thar Baker,et al.  Analysis of Dimensionality Reduction Techniques on Big Data , 2020, IEEE Access.

[9]  Muhammad Asif,et al.  Assessment of Secure OpenID-Based DAAA Protocol for Avoiding Session Hijacking in Web Applications , 2018, Secur. Commun. Networks.

[10]  Kai Fan,et al.  Lightweight NFC Protocol for Privacy Protection in Mobile IoT , 2018 .

[11]  Amro Al-Said Ahmad,et al.  Scalability analysis comparisons of cloud-based software services , 2019, J. Cloud Comput..

[12]  Paulo Romero Martins Maciel,et al.  Models for availability and power consumption evaluation of a private cloud with VMM rejuvenation enabled by VM Live Migration , 2018, The Journal of Supercomputing.

[13]  Joel J. P. C. Rodrigues,et al.  TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment , 2019, IEEE Transactions on Vehicular Technology.

[14]  Ehsan Ullah Munir,et al.  MOPT: list-based heuristic for scheduling workflows in cloud environment , 2018, The Journal of Supercomputing.

[15]  Reza Parsamehr,et al.  Mutual authentication protocol to share files in cloud storage , 2016, 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).

[16]  Jeremy M. Kaplan,et al.  Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds , 2017, IEEE Transactions on Cloud Computing.

[17]  Xu An Wang,et al.  New provable data transfer from provable data possession and deletion for secure cloud storage , 2019, Int. J. Distributed Sens. Networks.

[18]  Jian Shen,et al.  Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure , 2017, IEEE Transactions on Big Data.

[19]  Y. Yang,et al.  Security analysis of Kulseng et al.'s mutual authentication protocol for RFID systems , 2012, IET Inf. Secur..

[20]  David Pointcheval,et al.  Password-Based Authenticated Key Exchange in the Three-Party Setting , 2005, Public Key Cryptography.

[21]  Xiaohua Tian,et al.  AMCloud: Toward a Secure Autonomic Mobile Ad Hoc Cloud Computing System , 2017, IEEE Wireless Communications.

[22]  E Munivel,et al.  New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing , 2019, Secur. Commun. Networks.

[23]  Muhammad Tariq,et al.  Detection of Epilepsy Seizures in Neo-Natal EEG Using LSTM Architecture , 2019, IEEE Access.

[24]  Abdulrahman Al-Ahmari,et al.  Computational System to Classify Cyber Crime Offenses using Machine Learning , 2020, Sustainability.

[25]  Ao Fujiang,et al.  An Improved Uniform Identity Authentication Method Based on SAML in Cloud Environment , 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).

[26]  Baoyuan Kang,et al.  ID-Based Public Auditing Protocol for Cloud Storage Data Integrity Checking with Strengthened Authentication and Security , 2018, Wuhan University Journal of Natural Sciences.

[27]  Vidhyacharan Bhaskar,et al.  Identity and access management in cloud environment: Mechanisms and challenges , 2018 .

[28]  Tao Xiang,et al.  Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud , 2018, J. Parallel Distributed Comput..

[29]  Behnam Bahrak,et al.  An improved authentication protocol for distributed mobile cloud computing services , 2017, Int. J. Crit. Infrastructure Prot..

[30]  Athanasios V. Vasilakos,et al.  Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..

[31]  Jian Shen,et al.  Provable data transfer from provable data possession and deletion in cloud storage , 2017, Comput. Stand. Interfaces.

[32]  Bin Li,et al.  An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment , 2018, Wirel. Commun. Mob. Comput..

[33]  Prasanta K. Jana,et al.  A GSA based hybrid algorithm for bi-objective workflow scheduling in cloud computing , 2018, Future Gener. Comput. Syst..

[34]  Jens Groth,et al.  Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability , 2017, IACR Cryptol. ePrint Arch..

[35]  Hui Guo,et al.  Towards Secure Data Distribution Systems in Mobile Cloud Computing , 2017, IEEE Transactions on Mobile Computing.

[36]  Fadi Al-Turjman Smart Grid in IoT-Enabled Spaces : The Road to Intelligence in Power , 2020 .

[37]  Ion Stoica,et al.  DIZK: A Distributed Zero Knowledge Proof System , 2018, IACR Cryptol. ePrint Arch..

[38]  Fadi Al-Turjman,et al.  Correctness of an Authentication Scheme for Managing Demand Response in Smart Grid , 2020 .

[39]  Bahram Rashidi Authentication issues for cloud applications , 2019 .

[40]  Gautam Srivastava,et al.  KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks , 2020, IEEE Access.

[41]  Mainak Adhikari,et al.  A Survey on Scheduling Strategies for Workflows in Cloud Environment and Emerging Trends , 2019, ACM Comput. Surv..

[42]  Ali Sunyaev,et al.  Trust is Good, Control is Better: Creating Secure Clouds by Continuous Auditing , 2016, IEEE Transactions on Cloud Computing.