Consolidated Identity Management System for secure mobile cloud computing

被引:38
|
作者
Khalil, Issa [1 ]
Khreishah, Abdallah [2 ]
Azeem, Muhammad [3 ]
机构
[1] Qatar Fdn, Qatar Comp Res Inst, Doha, Qatar
[2] New Jersey Inst Technol, Newark Coll Engn, Newark, NJ 07102 USA
[3] United Arab Emirates Univ, Coll Informat Technol, Al Ain, U Arab Emirates
关键词
Cloud computing security; Privacy; Mobile clients; Identity Management Systems; Security attacks; PRIVACY;
D O I
10.1016/j.comnet.2014.03.015
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security issues in cloud computing are shown to be the biggest obstacle that could lower the wide benefits of the cloud systems. This obstacle may be strengthened when cloud services are accessed by mobile devices. Mobile devices could be easily lost or stolen and hence, they are easy to compromise. Additionally, mobile users tend to store access credentials, passwords and other Personal Identifiable Information (PII) in an improperly protected way. We conduct a survey and found that more than 66% of the surveyed users store PIIs in unprotected text files, cookies, or applications. To strengthen the legitimate access process over the clouds and to facilitate authentication and authorization with multiple cloud service providers, third-party Identity Management Systems (IDMs) have been proposed and implemented. In this paper, we discuss the limitations of the state-of-the-art cloud IDMs with respect to mobile clients. Specifically, we show that the current IDMs are vulnerable to three attacks, namely - IDM server compromise, mobile device compromise, and network traffic interception. Most importantly, we propose and validate a new IDM architecture dubbed Consolidated IDM (CIDM) that countermeasures these attacks. We conduct experiments to evaluate the performance and the security guarantees of CIDM and compare them with those of current IDM systems. Our experiments show that CIDM provides its clients with better security guarantees and that it has less energy and communication overhead compared to the current IDM systems. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:99 / 110
页数:12
相关论文
共 50 条
  • [1] Secure Identity Management System for Federated Cloud Environment
    Habiba, Umme
    Masood, Rahat
    Shibli, Muhammad Awais
    SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING, 2015, 569 : 17 - 33
  • [2] A Secure Framework for Mobile Cloud Computing
    Al-Omary, Alauddin
    2019 INTERNATIONAL CONFERENCE ON INNOVATION AND INTELLIGENCE FOR INFORMATICS, COMPUTING, AND TECHNOLOGIES (3ICT), 2019,
  • [3] Towards secure mobile cloud computing: A survey
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Khan, Samee U.
    Madani, Sajjad A.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (05): : 1278 - 1299
  • [4] A provable and secure mobile user authentication scheme for mobile cloud computing services
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Shafiq, Muhammad
    Usman, Muhammad
    Asif, Muhammad
    Ghani, Anwar
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (14)
  • [5] Secure identity management in mobile networks, applications and services
    Guo, Y
    5th World Wireless Congress, Proceedings, 2004, : 663 - 668
  • [6] Secure scheme on mobile multi cloud computing based on homomorphic encryption
    Zkik, Karim
    Orhanou, Ghizlane
    El Hajji, Said
    2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [7] An Enhanced Secure Authentication Scheme with User Anonymity in Mobile Cloud Computing
    Madhusudhan, R.
    Suvidha, K. S.
    2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 17 - 22
  • [8] Identity-based key management for cloud computing
    Zhu, Hong
    Mei, Zhuolin
    Xie, Meiyi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2143 - 2156
  • [9] An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment
    Raju, K.
    Chinnadurai, M.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1057 - 1072
  • [10] Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design
    Liu, Jianghua
    Ma, Jinhua
    Wu, Wei
    Chen, Xiaofeng
    Huang, Xinyi
    Xu, Li
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (02)