An Approach to Identity Management in Clouds without Trusted Third Parties
نویسندگان
چکیده
The management of sensitive data, including identity management (IDM), is an important problem in cloud computing, fundamental for authentication and fine-grained service access control. Our goal is creating an efficient and robust IDM solution that addresses critical issues in cloud computing. The proposed IDM scheme does not rely on trusted third parties (TTPs) or trusted dealers. The scheme is a multiparty interactive solution that combines RSA distributed key generation and attribute-based encryption. We believe that it will be a robust IDM privacy-preserving solution in cloud computing, because it has the following features: (i) protects sensitive data on untrusted hosts using active bundle; (ii) supports the minimum disclosure property; (iii) minimizes authentication overhead by providing single sign-on; (iv) supports authentication with encrypted credentials; (v) avoids using trusted third parties (TTPs_, incl. using TTPs for key management; (vi) supports revocation and delegation of access right; and (vii) supports revocation of user credentials. The scheme should also be efficient because it exploits parallelism.
منابع مشابه
Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks
One of the major security aspects in mobile communication networks concerns information about the localization of the (mobile) network user. This information may be protected by establishing a trusted third party that is responsible for creating suitable pseudonyms for the user identity. Distributing the maintenance of pseudonyms among n independent trusted parties allows to increase further th...
متن کاملMulti-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth
The services provided in clouds may represent an increase in the efficiency and effectiveness in the operations of the enterprise business, improving the cost-effectiveness related to services and resources consumption. However, there is concern about the privacy of data, since such data are outside the client’s domain. For these services to be effectively enjoyed by organizations it is necessa...
متن کاملA Distributed DRM Platform Based on a Web-Oriented Watermarking Protocol
This paper presents a distributed digital rights management platform (DRMp) based on a web-oriented watermarking protocol. The platform enables web service providers (SPs) to dynamically supply copyright protection services on behalf of web content providers (CPs) in a security context. Thus, CPs exploiting the platform can take advantage of copyright protection services supplied by SPs acting ...
متن کاملImplementation of a Trusted Ticket System
Trusted Computing is a security technology which enables the establishment of trust between multiple parties. Previous work showed that Trusted Computing technology can be used to build tickets, a core concept of Identity Management Systems. Relying solely on the Trusted Platform Module we will demonstrate how this technology can be used in the context of Kerberos for an implementation variant ...
متن کاملDecentralized Anonymous Credentials
Anonymous credentials provide a powerful tool for making assertions about identity while maintaining privacy. However, a limitation of today’s anonymous credential systems is the need for a trusted credential issuer — which is both a single point of failure and a target for compromise. Furthermore, the need for such a trusted issuer can make it challenging to deploy credential systems in practi...
متن کامل