Securing the Cloud

نویسنده

  • Marc Novakouski
چکیده

Identity management (IdM) is the complex and constantly evolving practice of identifying individuals and controlling their access to a network and connected resources. IdM research focuses primarily on making systems secure while the quality of the user experience is largely ignored. This article explores reasons why creating a user-centric IdM paradigm has become necessary, discusses existing efforts to make IdM more user centric, and presents one possible implementation of user-centric IdM that, in theory, could leverage mobile devices. A Future Vision for IdM However, computer users have bigger worries. Password theft plays a less significant role in identity theft than phishing and keylogging [3], and viruses, worms, malware, and other malicious software continue to increase [4]. Aspiring thieves who do not have the technical skills to perform attacks themselves can buy malware that others have created [4, 5]. And the Stuxnet worm has shown that cyber-attacks can be powerful enough to be used as weapons of international espionage or even war [6, 7]. Despite lack of expertise in security and IdM, users are often the first (and sometimes the only) line of defense against ever more dangerous forms of attack, such as: • Wifi hacking [8, 9] • Compromised personal devices and infrastructure systems [10, 11] • Social engineering [2, 3, 12] • Cookie sniffing [13, 14] • Timing attacks [15] • Man-in-the-middle (MITM) attacks [16, 17] • Insecure websites [2] • Broken encryption attributed to GPU (graphics processing unit) [18] and quantum computing attacks [19] Most users find these problems too complex to manage [17]. As a result, many ignore security advice or engage in poor practices such as using simplistic passwords or writing passwords on pieces of paper near their computers [20, 21]. While the security community belittles users for these approaches [14], some security experts state that this behavior is not only predictable but also rational, given the overwhelming amount of security advice that users receive [3, 10, 22, 23]. Clearly, average users lack the knowledge and skills needed to manage their own security. To resolve this dilemma, a radical shift must take place in IdM research. New directions in IdM research must meet the challenge for improved security by addressing a growing number of threats while reducing security demands on the user. The user-centric IdM model proposed in this article provides a potential solution. Changing the Game with User Centricity Because many users lack sufficient knowledge to manage their own online identity, any viable IdM strategy has three goals: 1. Improved Threat Resilience: Increase the capability of users to resist threats. 2. Improved Credential Management: Improve the capabil ity of users to manage an arbitrary number of credentials. 3. Reduced User Load: Decrease the knowledge and effort required of users to resist threats. Unfortunately, these goals tend to be contradictory. The typical approach to improving the security of a system addresses threats individually, which tends to increase system complexity and restrictions on user access and require more skills and knowledge of the user to ensure safe behaviors. Moreover, each system addresses problems in different ways, which leads to unique IdM requirements for each system with which a user interacts. Thus, the goal of increasing threat resilience overrides the user-based goals of improving credential management and reducing user load. User-Centric Identity Management

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Poster: Secure Provenance for Cloud Storage

Organizations are increasingly turning to the cloud for data processing and storage. Storing data in the cloud is advantageous for numerous reasons: the elasticity of cloud environments ensures that only storage used is paid for, while tasks such as backup, replication, and geographic diversification of data are effectively outsourced to cloud storage providers. However, unfettered access to th...

متن کامل

Securing Portable Document Format File Using Extended Visual Cryptography to Protect Cloud Data Storage

With the vast development in cloud computing model, various organizations and individuals often deploy the cloud without reviewing the security policies and procedures which can cause great risk in their business. Securing data in cloud storage becomes a challenging task not only for the cloud user but also to the Cloud Service Provider (CSP). Storing secret data in unencrypted form is suscepti...

متن کامل

Security Policies for Securing Cloud Databases

Databases are an important and almost mandatory means for storing information for later use. Databases require effective security to protect the information stored within them. In particular access control measures are especially important for cloud databases, because they can be accessed from anywhere in the world at any time via the Internet. The internet has provided a plethora of advantages...

متن کامل

Towards Securing APIs in Cloud Computing

Every organisation today wants to adopt cloud computing paradigm and leverage its various advantages. Today everyone is aware of its characteristics which have made it so popular and how it can help the organisations focus on their core activities leaving all IT services development and maintenance to the cloud service providers. But it’s the security concerns that customers have which are prev...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013