Managing Identities in Cloud Computing Environments

As cloud computing becomes a hot spot of research, the security issues of clouds raise concerns and attention from academic research community. A key area of cloud security is managing users' identities, which is fundamental and important to other aspects of cloud computing. A number of identity management frameworks and systems are introduced and analysed. Issues remaining in them are discussed and potential solutions and countermeasures are proposed.

[1]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[2]  Ken Klingenstein,et al.  Federated Security: The Shibboleth Approach , 2004 .

[3]  Audun Jøsang,et al.  A User-centric Federated Single Sign-on System , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[4]  Audun Jøsang,et al.  Trust Requirements in Identity Management , 2005, ACSW.

[5]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[6]  Bhavani M. Thuraisingham,et al.  Identity management for cloud computing: developments and directions , 2011, CSIIRW '11.

[7]  Abdul Ghafoor Abbasi,et al.  Assessment Criteria for Cloud Identity Management Systems , 2013, 2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing.

[8]  Lin Yang,et al.  A survey of Identity Management technology , 2010, 2010 IEEE International Conference on Information Theory and Information Security.

[9]  Issa M. Khalil,et al.  Security Concerns in Cloud Computing , 2013, 2013 10th International Conference on Information Technology: New Generations.

[10]  R. D. Dhungana,et al.  Identity management framework for cloud networking infrastructure , 2013, 2013 9th International Conference on Innovations in Information Technology (IIT).

[11]  Bharat K. Bhargava,et al.  An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing , 2010, 2010 29th IEEE Symposium on Reliable Distributed Systems.

[12]  A. Jøsang,et al.  User Centric Identity Management , 2005 .

[13]  Gabi Dreo Rodosek,et al.  ICEMAN: An architecture for secure federated inter-cloud identity management , 2013, 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013).

[14]  Abhilasha Bhargav-Spantzel,et al.  User centricity: a taxonomy and open issues , 2006, DIM '06.

[15]  Subhankar Dhar,et al.  From outsourcing to Cloud computing: Evolution of IT services , 2011, First International Technology Management Conference.

[16]  Joni da Silva Fraga,et al.  Integral Federated Identity Management for Cloud Computing , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).