Cargando…

Trusted Computing Strengthens Cloud Authentication

Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Compani...

Descripción completa

Detalles Bibliográficos
Autores principales: Ghazizadeh, Eghbal, Zamani, Mazdak, Ab Manan, Jamalul-lail, Alizadeh, Mojtaba
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3948200/
https://www.ncbi.nlm.nih.gov/pubmed/24701149
http://dx.doi.org/10.1155/2014/260187
_version_ 1782306762039230464
author Ghazizadeh, Eghbal
Zamani, Mazdak
Ab Manan, Jamalul-lail
Alizadeh, Mojtaba
author_facet Ghazizadeh, Eghbal
Zamani, Mazdak
Ab Manan, Jamalul-lail
Alizadeh, Mojtaba
author_sort Ghazizadeh, Eghbal
collection PubMed
description Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.
format Online
Article
Text
id pubmed-3948200
institution National Center for Biotechnology Information
language English
publishDate 2014
publisher Hindawi Publishing Corporation
record_format MEDLINE/PubMed
spelling pubmed-39482002014-04-03 Trusted Computing Strengthens Cloud Authentication Ghazizadeh, Eghbal Zamani, Mazdak Ab Manan, Jamalul-lail Alizadeh, Mojtaba ScientificWorldJournal Research Article Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model. Hindawi Publishing Corporation 2014-02-18 /pmc/articles/PMC3948200/ /pubmed/24701149 http://dx.doi.org/10.1155/2014/260187 Text en Copyright © 2014 Eghbal Ghazizadeh et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Ghazizadeh, Eghbal
Zamani, Mazdak
Ab Manan, Jamalul-lail
Alizadeh, Mojtaba
Trusted Computing Strengthens Cloud Authentication
title Trusted Computing Strengthens Cloud Authentication
title_full Trusted Computing Strengthens Cloud Authentication
title_fullStr Trusted Computing Strengthens Cloud Authentication
title_full_unstemmed Trusted Computing Strengthens Cloud Authentication
title_short Trusted Computing Strengthens Cloud Authentication
title_sort trusted computing strengthens cloud authentication
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3948200/
https://www.ncbi.nlm.nih.gov/pubmed/24701149
http://dx.doi.org/10.1155/2014/260187
work_keys_str_mv AT ghazizadeheghbal trustedcomputingstrengthenscloudauthentication
AT zamanimazdak trustedcomputingstrengthenscloudauthentication
AT abmananjamalullail trustedcomputingstrengthenscloudauthentication
AT alizadehmojtaba trustedcomputingstrengthenscloudauthentication