Sciweavers

Share
SRDS
2010
IEEE

Protection of Identity Information in Cloud Computing without Trusted Third Party

8 years 2 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources but also poses risks for data privacy. A single breach can cause significant loss. The heterogeneity of "users" represents a danger of multiple, collaborative threats. In cloud computing, entities may have multiple accounts associated with a single or multiple service providers (SPs). Sharing sensitive identity information (that is, Personally Identifiable information or PII) along with associated attributes of the same entity across services can lead to mapping of the identities to the entity, tantamount to privacy loss. Identity management (IDM) is one of the core components in cloud privacy and security and can help alleviate some of the problems associated with cloud computing. Available solutions use trusted third party (TTP) in identifying entities to SPs. The solution providers do not recommend...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma
Added 15 Feb 2011
Updated 15 Feb 2011
Type Journal
Year 2010
Where SRDS
Authors Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othmane, Leszek Lilien, Anya Kim, Myong H. Kang, Mark Linderman
Comments (0)
books