Consolidated Identity Management System for secure mobile cloud computing

被引:38
|
作者
Khalil, Issa [1 ]
Khreishah, Abdallah [2 ]
Azeem, Muhammad [3 ]
机构
[1] Qatar Fdn, Qatar Comp Res Inst, Doha, Qatar
[2] New Jersey Inst Technol, Newark Coll Engn, Newark, NJ 07102 USA
[3] United Arab Emirates Univ, Coll Informat Technol, Al Ain, U Arab Emirates
关键词
Cloud computing security; Privacy; Mobile clients; Identity Management Systems; Security attacks; PRIVACY;
D O I
10.1016/j.comnet.2014.03.015
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security issues in cloud computing are shown to be the biggest obstacle that could lower the wide benefits of the cloud systems. This obstacle may be strengthened when cloud services are accessed by mobile devices. Mobile devices could be easily lost or stolen and hence, they are easy to compromise. Additionally, mobile users tend to store access credentials, passwords and other Personal Identifiable Information (PII) in an improperly protected way. We conduct a survey and found that more than 66% of the surveyed users store PIIs in unprotected text files, cookies, or applications. To strengthen the legitimate access process over the clouds and to facilitate authentication and authorization with multiple cloud service providers, third-party Identity Management Systems (IDMs) have been proposed and implemented. In this paper, we discuss the limitations of the state-of-the-art cloud IDMs with respect to mobile clients. Specifically, we show that the current IDMs are vulnerable to three attacks, namely - IDM server compromise, mobile device compromise, and network traffic interception. Most importantly, we propose and validate a new IDM architecture dubbed Consolidated IDM (CIDM) that countermeasures these attacks. We conduct experiments to evaluate the performance and the security guarantees of CIDM and compare them with those of current IDM systems. Our experiments show that CIDM provides its clients with better security guarantees and that it has less energy and communication overhead compared to the current IDM systems. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:99 / 110
页数:12
相关论文
共 50 条
  • [41] Secure cloud computing model for communication network management
    Tian, Shuicheng
    Tang, Kai
    Yang, Pengfei
    Jia, Aifang
    Melvin, Hailey
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (01) : 27 - 34
  • [42] Secure User Authentication in Cloud Computing Management Interfaces
    Soares, Liliana F. B.
    Fernandes, Diogo A. B.
    Freire, Mario M.
    Inacio, Pedro R. M.
    2013 IEEE 32ND INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2013,
  • [43] Secure Data Management Service on Cloud Computing Infrastructures
    Agrawal, Divyakant
    El Abbadi, Amr
    Emekci, Fatih
    Metwally, Ahmed
    Wang, Shiyuan
    NEW FRONTIERS IN INFORMATION AND SOFTWARE AS SERVICES: SERVICE AND APPLICATION DESIGN CHALLENGES IN THE CLOUD, 2011, 74 : 57 - +
  • [44] Intelligent techniques for secure financial management in cloud computing
    Ogiela, Lidia
    ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2015, 14 (06) : 456 - 464
  • [45] A Secure Mobile Cloud Photo Storage System
    Schwab, David
    Yang, Li
    Winters, Katherine
    Jallouk, Matthew
    Smith, Emile
    Claiborne, Adam
    2017 26TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN 2017), 2017,
  • [46] Secure and Privacy-Preserving Identity Management in the Cloud
    Zwattendorfer, Bernd
    Krenn, Stephan
    Loruenser, Thomas
    ERCIM NEWS, 2016, (104): : 44 - +
  • [47] An Efficient and Secure Means for Identity and Trust Management in Cloud
    Nida
    Teli, Bhupendra Kumar
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 677 - 682
  • [48] Secured Identity Management System for Preserving Data Privacy and Transmission in Cloud Computing
    Rastogi, Garima
    Sushil, Rama
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2018, 11 (01): : 23 - 36
  • [49] Management of Identity and Credentials in Mobile Cloud Environment
    Jana, Debasish
    Bandyopadhyay, Debasis
    2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND INFORMATION SYSTEMS (ICACSIS), 2013, : 113 - 118
  • [50] A Secure IoT and Cloud Computing-Enabled e-Health Management System
    Butpheng, Chanapha
    Yeh, Kuo-Hui
    Hou, Jia-Li
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022