Consolidated Identity Management System for secure mobile cloud computing

被引:38
|
作者
Khalil, Issa [1 ]
Khreishah, Abdallah [2 ]
Azeem, Muhammad [3 ]
机构
[1] Qatar Fdn, Qatar Comp Res Inst, Doha, Qatar
[2] New Jersey Inst Technol, Newark Coll Engn, Newark, NJ 07102 USA
[3] United Arab Emirates Univ, Coll Informat Technol, Al Ain, U Arab Emirates
关键词
Cloud computing security; Privacy; Mobile clients; Identity Management Systems; Security attacks; PRIVACY;
D O I
10.1016/j.comnet.2014.03.015
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security issues in cloud computing are shown to be the biggest obstacle that could lower the wide benefits of the cloud systems. This obstacle may be strengthened when cloud services are accessed by mobile devices. Mobile devices could be easily lost or stolen and hence, they are easy to compromise. Additionally, mobile users tend to store access credentials, passwords and other Personal Identifiable Information (PII) in an improperly protected way. We conduct a survey and found that more than 66% of the surveyed users store PIIs in unprotected text files, cookies, or applications. To strengthen the legitimate access process over the clouds and to facilitate authentication and authorization with multiple cloud service providers, third-party Identity Management Systems (IDMs) have been proposed and implemented. In this paper, we discuss the limitations of the state-of-the-art cloud IDMs with respect to mobile clients. Specifically, we show that the current IDMs are vulnerable to three attacks, namely - IDM server compromise, mobile device compromise, and network traffic interception. Most importantly, we propose and validate a new IDM architecture dubbed Consolidated IDM (CIDM) that countermeasures these attacks. We conduct experiments to evaluate the performance and the security guarantees of CIDM and compare them with those of current IDM systems. Our experiments show that CIDM provides its clients with better security guarantees and that it has less energy and communication overhead compared to the current IDM systems. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:99 / 110
页数:12
相关论文
共 50 条
  • [31] Guest editorial: Secure cloud computing for mobile health services
    Haider Abbas
    Sana Ullah
    Sudip Misra
    Yuh-Shyan Chen
    Peer-to-Peer Networking and Applications, 2016, 9 : 809 - 811
  • [32] A provable and secure mobile user authentication scheme for mobile cloud computing services
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Shafiq, Muhammad
    Usman, Muhammad
    Asif, Muhammad
    Ghani, Anwar
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (14)
  • [33] Guest editorial: Secure cloud computing for mobile health services
    Abbas, Haider
    Ullah, Sana
    Misra, Sudip
    Chen, Yuh-Shyan
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (05) : 809 - 811
  • [34] SSOP: Secure Storage Outsourcing Protocols in Mobile Cloud Computing
    Liu, Xiao
    Jiang, Rui
    Kong, Huafeng
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 678 - 683
  • [35] Mobile Cloud Computing in Healthcare System
    Jemal, Hanen
    Kechaou, Zied
    Ben Ayed, Mounir
    Alimi, Adel M.
    COMPUTATIONAL COLLECTIVE INTELLIGENCE (ICCCI 2015), PT II, 2015, 9330 : 408 - 417
  • [36] A Distributed Mobile Cloud Computing Model for Secure Big Data
    Sung, Soonhwa
    Youn, Cheong
    Kong, Eunbae
    Ryou, Jaecheol
    2016 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2016, : 312 - 316
  • [37] A SECURE AUTHENTICATION SCHEME FOR MOBILE CLOUD COMPUTING AGAINST CCA
    Hossain, Md Jakir
    Xu, Chunxiang
    Li, Chuang
    2020 17TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2020, : 266 - 270
  • [38] Efficient and secure encrypted image search in mobile cloud computing
    Qin Zou
    Jianfeng Wang
    Jun Ye
    Jian Shen
    Xiaofeng Chen
    Soft Computing, 2017, 21 : 2959 - 2969
  • [39] Adaptive and Secure Application Partitioning for Offloading in Mobile Cloud Computing
    Dhanya, N. M.
    Kousalya, G.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 45 - 53
  • [40] Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing
    Huang, Qinlong
    Yue, Wei
    He, Yue
    Yang, Yixian
    IEEE ACCESS, 2018, 6 : 36584 - 36594