Secure Identity Management In Mobile Cloud Computing

被引:0
|
作者
Suguna, M. [1 ]
Shalinie, S. Mercy [1 ]
Anusia, R. [1 ]
Deepti, S. [1 ]
机构
[1] Thiagarajar Coll Engn, Dept Comp Sci & Engn, Madurai, Tamil Nadu, India
关键词
MCC; IDM; CIDM; Identity theft; SIDM; Identity privacy; ZKP;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile cloud computing (MCC) is a platform that allows mobile users to offload the computationally rigorous and storage demanding tasks on available cloud resources using wireless access. The major concern with MCC is the privacy of data. Mobile users give confidential information through the network, that if not safeguarded may lead to security issues. Identity Management (IDM) is the management of user identities, their authentication, and authorization in the cloud environment. The existing Consolidated Identity Management (CIDM) overcomes the network traffic interception in the traditional IDM but is prone to Identity theft in case of Identity Management Server (IDMS) compromise. This work is focused on the development of a Secure Identity Management (SIDM) that alleviates the attacks in the CIDM by using techniques that strengthens the authentication process and identity privacy. A secure IDM is developed using two-step authentication process which involves Zero Knowledge Proof (ZKP) and token verification. The proposed SIDM model reduces the consequences of Identity server compromise attack. There is a marginal increase in the communication overhead of SIDM compared to that of CIDM but it can be compromised to realize the benefits of identity privacy. The analysis of the experimental results shows that there is an overall increase of thirty percent in communication overhead when compared to CIDM.
引用
收藏
页码:42 / 45
页数:4
相关论文
共 50 条
  • [1] Consolidated Identity Management System for secure mobile cloud computing
    Khalil, Issa
    Khreishah, Abdallah
    Azeem, Muhammad
    COMPUTER NETWORKS, 2014, 65 : 99 - 110
  • [2] Improved Identity Management Protocol for Secure Mobile Cloud Computing
    Park, In-Shin
    Lee, Yoon-Deock
    Jeong, Jonpil
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 4958 - 4965
  • [3] Secure mobile cloud computing
    Kolodziej, Joanna
    Jaatun, Martin Gilje
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (18):
  • [4] A Secure Mobile Cloud Identity: Criteria for Effective Identity and Access Management Standards
    Naik, Nitin
    Jenkins, Paul
    2016 4TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2016), 2016, : 89 - 90
  • [5] A Framework for Secure Mobile Cloud Computing
    Ramavathu, Lakshmananaik
    Bairam, Manjula
    Manchala, Sadanandam
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 353 - 363
  • [6] A Secure Framework for Mobile Cloud Computing
    Al-Omary, Alauddin
    2019 INTERNATIONAL CONFERENCE ON INNOVATION AND INTELLIGENCE FOR INFORMATICS, COMPUTING, AND TECHNOLOGIES (3ICT), 2019,
  • [7] An Enhance Mechanism for Secure Data Sharing with Identity Management in Cloud Computing
    Modi, Hardika
    Patel, Shital
    Suthar, Krunal
    ADVANCES IN COMPUTING AND INTELLIGENT SYSTEMS, ICACM 2019, 2020, : 575 - 582
  • [8] A new definition of homomorphic signature for identity management in mobile cloud computing
    Wang, Zhiwei
    Sur, Guozi
    Chen, Danwei
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (03) : 546 - 553
  • [9] Towards secure mobile cloud computing: A survey
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Khan, Samee U.
    Madani, Sajjad A.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (05): : 1278 - 1299
  • [10] SMOC: A Secure Mobile Cloud Computing Platform
    Hao, Zijiang
    Tang, Yutao
    Zhang, Yifan
    Novak, Ed
    Carter, Nancy
    Li, Qun
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,