Consolidated Identity Management System for secure mobile cloud computing

被引:38
作者
Khalil, Issa [1 ]
Khreishah, Abdallah [2 ]
Azeem, Muhammad [3 ]
机构
[1] Qatar Fdn, Qatar Comp Res Inst, Doha, Qatar
[2] New Jersey Inst Technol, Newark Coll Engn, Newark, NJ 07102 USA
[3] United Arab Emirates Univ, Coll Informat Technol, Al Ain, U Arab Emirates
关键词
Cloud computing security; Privacy; Mobile clients; Identity Management Systems; Security attacks; PRIVACY;
D O I
10.1016/j.comnet.2014.03.015
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security issues in cloud computing are shown to be the biggest obstacle that could lower the wide benefits of the cloud systems. This obstacle may be strengthened when cloud services are accessed by mobile devices. Mobile devices could be easily lost or stolen and hence, they are easy to compromise. Additionally, mobile users tend to store access credentials, passwords and other Personal Identifiable Information (PII) in an improperly protected way. We conduct a survey and found that more than 66% of the surveyed users store PIIs in unprotected text files, cookies, or applications. To strengthen the legitimate access process over the clouds and to facilitate authentication and authorization with multiple cloud service providers, third-party Identity Management Systems (IDMs) have been proposed and implemented. In this paper, we discuss the limitations of the state-of-the-art cloud IDMs with respect to mobile clients. Specifically, we show that the current IDMs are vulnerable to three attacks, namely - IDM server compromise, mobile device compromise, and network traffic interception. Most importantly, we propose and validate a new IDM architecture dubbed Consolidated IDM (CIDM) that countermeasures these attacks. We conduct experiments to evaluate the performance and the security guarantees of CIDM and compare them with those of current IDM systems. Our experiments show that CIDM provides its clients with better security guarantees and that it has less energy and communication overhead compared to the current IDM systems. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:99 / 110
页数:12
相关论文
共 50 条
[41]   Secure Picture Data Partitioning for Cloud Computing Services [J].
Leistikow, Rene ;
Tavangarian, Djamshid .
2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, :668-671
[42]   A systematic literature review of mobile cloud computing [J].
Ibukun, Eweoya ;
Daramola, Olawande .
International Journal of Multimedia and Ubiquitous Engineering, 2015, 10 (12) :135-152
[43]   An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing [J].
Ahuja, Rohit ;
Mohanty, Sraban Kumar ;
Sakurai, Kouichi .
2016 11TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2016, :39-47
[44]   FABRIC: Fast and Secure Unbounded Cross-System Encrypted Data Sharing in Cloud Computing [J].
Wang, Lili ;
Lin, Ye ;
Yao, Ting ;
Xiong, Hu ;
Liang, Kaitai .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) :5130-5142
[45]   Distributed Secure Computing for Smart Mobile IoT Networks [J].
Sharma, Vishal ;
Reina, Daniel G. ;
Li, Zengpeng ;
Srinivasan, Kathiravan ;
Sharma, Navuday ;
Karar, Vinod .
MOBILE INFORMATION SYSTEMS, 2022, 2022
[46]   A Secure Dispersed Computing Scheme for Internet of Mobile Things [J].
Zhao, Yan ;
Hu, Ning ;
Zou, Jincai ;
Zhang, Yuqiang .
MOBILE INTERNET SECURITY, MOBISEC 2021, 2022, 1544 :65-78
[47]   Mobile Identity Management Revisited [J].
Tatli, Emin Islam ;
Lucks, Stefan .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 244 :125-137
[48]   Achieving Trust in Cloud Computing Using Secure Data Provenance [J].
Saad, Mohd Izuan Mohd ;
Jalil, Kamarularifin Abd ;
Manaf, Mazani .
2014 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS), 2014, :84-88
[49]   A lightweight anonymous authentication scheme for secure cloud computing services [J].
Hamza Hammami ;
Sadok Ben Yahia ;
Mohammad S. Obaidat .
The Journal of Supercomputing, 2021, 77 :1693-1713
[50]   A lightweight anonymous authentication scheme for secure cloud computing services [J].
Hammami, Hamza ;
Ben Yahia, Sadok ;
Obaidat, Mohammad S. .
JOURNAL OF SUPERCOMPUTING, 2021, 77 (02) :1693-1713