A Metric-Based Approach to Assess Risk for "On Cloud" Federated Identity Management

被引:21
|
作者
Arias-Cabarcos, Patricia [1 ]
Almenarez-Mendoza, Florina [1 ]
Marin-Lopez, Andres [1 ]
Diaz-Sanchez, Daniel [1 ]
Sanchez-Guerrero, Rosa [1 ]
机构
[1] Univ Carlos III Madrid, Dept Telemat Engn, Madrid 28911, Spain
关键词
Trust management; Cloud computing; Risk assessment metrics; SAML; Federation; SECURITY ISSUES;
D O I
10.1007/s10922-012-9244-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cloud computing paradigm is set to become the next explosive revolution on the Internet, but its adoption is still hindered by security problems. One of the fundamental issues is the need for better access control and identity management systems. In this context, Federated Identity Management (FIM) is identified by researchers and experts as an important security enabler, since it will play a vital role in allowing the global scalability that is required for the successful implantation of cloud technologies. However, current FIM frameworks are limited by the complexity of the underlying trust models that need to be put in place before inter-domain cooperation. Thus, the establishment of dynamic federations between the different cloud actors is still a major research challenge that remains unsolved. Here we show that risk evaluation must be considered as a key enabler in evidence-based trust management to foster collaboration between cloud providers that belong to unknown administrative domains in a secure manner. In this paper, we analyze the Federated Identity Management process and propose a taxonomy that helps in the classification of the involved risks in order to mitigate vulnerabilities and threats when decisions about collaboration are made. Moreover, a set of new metrics is defined to allow a novel form of risk quantification in these environments. Other contributions of the paper include the definition of a generic hierarchical risk aggregation system, and a descriptive use-case where the risk computation framework is applied to enhance cloud-based service provisioning.
引用
收藏
页码:513 / 533
页数:21
相关论文
共 50 条
  • [41] Reliability Analysis of Trust based Federated Identity Management in InterCloud: A Graph Coloring Approach
    Premarathne, Uthpala Subodhani
    [J]. 2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 345 - 348
  • [42] Program Code Understandability and Authenticating Code Predicting Systems: A Metric-Based Approach
    Jha, Pooja
    Patnaik, K. Sridhar
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL, NETWORKS, COMPUTING, AND SYSTEMS (ICSNCS 2016), VOL 2, 2016, 396 : 95 - 103
  • [43] Enhancing Federated Cloud Management with an Integrated Service Monitoring Approach
    Kertesz, A.
    Kecskemeti, G.
    Oriol, M.
    Kotcauer, P.
    Acs, S.
    Rodriguez, M.
    Merce, O.
    Marosi, A. Cs
    Marco, J.
    Franch, X.
    [J]. JOURNAL OF GRID COMPUTING, 2013, 11 (04) : 699 - 720
  • [44] Enhancing Federated Cloud Management with an Integrated Service Monitoring Approach
    A. Kertesz
    G. Kecskemeti
    M. Oriol
    P. Kotcauer
    S. Acs
    M. Rodríguez
    O. Mercè
    A. Cs. Marosi
    J. Marco
    X. Franch
    [J]. Journal of Grid Computing, 2013, 11 : 699 - 720
  • [45] An integrated approach to federated identity and privilege management in open systems
    Bhatti, Rafae
    Bertino, Elisa
    Ghafoor, Arif
    [J]. COMMUNICATIONS OF THE ACM, 2007, 50 (02) : 81 - 87
  • [46] An Approach to Counteracting the Common Cyber-attacks According to the Metric-Based Model
    Geramiparvar, Mohammad Sirwan
    Modiri, Nasser
    [J]. International Journal of Computer Science and Network Security, 2016, 16 (01): : 81 - 85
  • [47] A novel parallel distance metric-based approach for diversified ranking on large graphs
    Li, Jin
    Yang, Yun
    Wang, Xiaoling
    Zhao, Zhiming
    Li, Tong
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 88 : 79 - 91
  • [48] An Approach for Assessing Similarity Metrics Used in Metric-based Clone Detection Techniques
    Shawky, Doaa M.
    Ali, Ahmed F.
    [J]. PROCEEDINGS 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, (ICCSIT 2010), VOL 1, 2010, : 580 - 584
  • [49] An Efficient Metric-Based Approach for Static Use-After-Free Detection
    Wei, Haolai
    Chen, Liwei
    Nie, Xiaofan
    Zhang, Zhijie
    Zhang, Yuantong
    Shi, Gang
    [J]. 2022 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING, ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM, 2022, : 58 - 65
  • [50] An Ontology-based Architecture for Federated Identity Management
    Layouni, Farah
    Pollet, Yann
    [J]. 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 162 - 166