Back to Current Issues

CloudSim Framework for Federation of identity management in Cloud Computing

Rohit Shere, Sonika Shrivastava, R.K. Pateriya

Affiliations
Department of Computer Science & Engineering, MANIT, Bhopal, 462003, India
:10.22362/ijcert/2017/v4/i6/xxxx [UNDER PROCESS]


Abstract
Cloud computing is built on several components for managing and making provision of abundant resources to business, on demand. Identity management is the essential element in cloud computing, and it is an inevitable standard security module that keeps away unauthorized users with unintentional interference to the system. The majority of work is being done to enhance this identity management component to overcome current limitations in authentication mechanisms. Federation among different clouds can be helpful in minimizing overhead and cost in overall identity management. Many cloud service providers are present in the industry with their independent identity management, but very few of them supports the federation among themselves to tackle the whole business collapse situation due to any disaster caused by nature. The Federation among these vendors can bring healthy competition in business markets that will lead to boost the confidence of cloud user in cloud computing. In this paper, our research work addresses a framework for researchers in identity management in cloud computing. The framework takes minimal effort and time for creating and simulating test environment for the generalized cloud environment.


Citation
Rohit Shere, Sonika Shrivastava, & R.K. Pateriya. (2017). CloudSim Framework for Federation of identity management in Cloud Computing. International Journal of Computer Engineering In Research Trends, 4(6), 269-276. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I6011.pdf


Keywords : FID, ECC algorithm, Hashing technique, CloudSim, Sign up Authentication.

References
1.	Hong Liu, Student Member, IEEE, Huansheng Ning, Senior Member, IEEE, Qingxu Xiong, Member,IEEE, and Laurence T. Yang, Member, IEEE2014, “Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing.”
2.	Adleman, L., “A subexponential algorithm for the discrete logarithm problem with application to cryptography”, Proc. 20th IEEE Found. Comp. Sci. Symp., 1979, 55-60. 
3.	Ganeshan R. et.al, “Performance analysis of Hyper-Elliptic Curve Cryptosystems over Finite Fields Fp for Genus 2 & 4”, IJCSNS Vol. 8 No. 12, Dec 2008
4.	“The Notorious Nine - Cloud Computing Top Threats in 2013,” https://downloads.cloudsecurityalliance.org/initiatives/top_threats“Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud,” IEEE Transactions on Services Computing, VOL. X, NO. X, XXXX 2014, accepted.
5.	Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou, “A Hybrid Cloud Approach for Secure Authorized Deduplication”, IEEE Transactions on Parallel and Distributed Systems, 2014.
6.	Lluis Pamies-Juarez, Pedro Garcia-Lopez, Marc Sanchez-Artigas, Blas Herrera, “Towards the Design of Optimal Data Redundancy Schemes for Heterogeneous Cloud Storage Infrastructures” ,” Computer Networks, Vol.55, 1100-1113, 2011.
7.	Deyan Chen, Hong Zhao, “Data Security and Privacy Protection Issues in Cloud Computing”, International Conference on Computer Science and Electronics Engineering 2012.
8.	K. Ren, C. Wang, and Q. Wang, “Security Challenges for the Public Cloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69–73,2012.
9.	Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, Jin Li, ”Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing”, Proc. IEEE transactions on parallel and distributed systems, vol. 22, no. 5, may 2011 .
10.	OASIS: Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS Standard (2005) 
11.	Benjain Ertl, "Identity Harmonization for Federated HPC, Grid and Cloud Services", IEEE, pp. 621-627, 2016.
12.	Jaweher Zouari, "An Identity as a service framework for the cloud", IEEE, pp. 1-5, 2016.
13.	Yong Yu, "Identity based Remote Data Integrity hacking with perfect data privacy preserving for cloud storage", IEEE, pp. 1-11, 2016.


DOI Link : Not yet assigned

Download :
  V4I6011.pdf


Refbacks : There are currently no refbacks

Quick Links


DOI:10.22362/ijcert


Science Central

Score: 13.30



Submit your paper to editorijcert@gmail.com

>