Consolidated Identity Management System for secure mobile cloud computing

被引:38
作者
Khalil, Issa [1 ]
Khreishah, Abdallah [2 ]
Azeem, Muhammad [3 ]
机构
[1] Qatar Fdn, Qatar Comp Res Inst, Doha, Qatar
[2] New Jersey Inst Technol, Newark Coll Engn, Newark, NJ 07102 USA
[3] United Arab Emirates Univ, Coll Informat Technol, Al Ain, U Arab Emirates
关键词
Cloud computing security; Privacy; Mobile clients; Identity Management Systems; Security attacks; PRIVACY;
D O I
10.1016/j.comnet.2014.03.015
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security issues in cloud computing are shown to be the biggest obstacle that could lower the wide benefits of the cloud systems. This obstacle may be strengthened when cloud services are accessed by mobile devices. Mobile devices could be easily lost or stolen and hence, they are easy to compromise. Additionally, mobile users tend to store access credentials, passwords and other Personal Identifiable Information (PII) in an improperly protected way. We conduct a survey and found that more than 66% of the surveyed users store PIIs in unprotected text files, cookies, or applications. To strengthen the legitimate access process over the clouds and to facilitate authentication and authorization with multiple cloud service providers, third-party Identity Management Systems (IDMs) have been proposed and implemented. In this paper, we discuss the limitations of the state-of-the-art cloud IDMs with respect to mobile clients. Specifically, we show that the current IDMs are vulnerable to three attacks, namely - IDM server compromise, mobile device compromise, and network traffic interception. Most importantly, we propose and validate a new IDM architecture dubbed Consolidated IDM (CIDM) that countermeasures these attacks. We conduct experiments to evaluate the performance and the security guarantees of CIDM and compare them with those of current IDM systems. Our experiments show that CIDM provides its clients with better security guarantees and that it has less energy and communication overhead compared to the current IDM systems. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:99 / 110
页数:12
相关论文
共 50 条
  • [21] Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing
    Fatima, Shahin
    Ahmad, Shish
    INTERNATIONAL JOURNAL OF E-COLLABORATION, 2020, 16 (01) : 1 - 15
  • [22] An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing
    Akram, Waseem
    Mahmood, Khalid
    Li, Xiong
    Sadiq, Mazhar
    Lv, Zhihan
    Chaudhry, Shehzad Ashraf
    COMPUTER NETWORKS, 2022, 217
  • [23] Platform Capability Based Identity Management for Scalable and Secure Cloud Service Access
    Bhargav-Spantzel, Abhilasha
    Deutsch, Steve W.
    2012 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2012, : 763 - 768
  • [24] On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services
    Roy, Sandip
    Chatterjee, Santanu
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    IEEE ACCESS, 2017, 5 : 25808 - 25825
  • [25] Secure cloud computing using homomorphic construction
    Swathi V.
    Vani M.P.
    International Journal of Cloud Computing, 2019, 8 (04): : 354 - 370
  • [26] Blockchain as a Platform for Secure Cloud Computing Services
    Tsai, Wang-You
    Chou, Tzu-Chuan
    Chen, Jiann-Liang
    Ma, Yi-Wei
    Huang, Chen-Jui
    2020 22ND INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): DIGITAL SECURITY GLOBAL AGENDA FOR SAFE SOCIETY!, 2020, : 155 - 158
  • [27] A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid
    Baek, Joonsang
    Quang Hieu Vu
    Liu, Joseph K.
    Huang, Xinyi
    Xiang, Yang
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2015, 3 (02) : 233 - 244
  • [28] Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing
    Abdul Nasir Khan
    M. L. Mat Kiah
    Sajjad A. Madani
    Atta ur Rehman Khan
    Mazhar Ali
    The Journal of Supercomputing, 2013, 66 : 1687 - 1706
  • [29] Security and Privacy in Mobile Cloud Computing
    Suo, Hui
    Liu, Zhuohua
    Wan, Jiafu
    Zhou, Keliang
    2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 655 - 659
  • [30] Privacy using Mobile Cloud Computing
    Abdo, Jacques Bou
    Demerjian, Jacques
    Chaouchi, Hakima
    Atechian, Talar
    Bassil, Carole
    2015 FIFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS (DICTAP), 2015, : 178 - 182