9 research outputs found

    Evaluation Theory for Characteristics of Cloud Identity Trust Framework

    Get PDF
    Trust management is a prominent area of security in cloud computing because insufficient trust management hinders cloud growth. Trust management systems can help cloud users to make the best decision regarding the security, privacy, Quality of Protection (QoP), and Quality of Service (QoS). A Trust model acts as a security strength evaluator and ranking service for the cloud and cloud identity applications and services. It might be used as a benchmark to setup the cloud identity service security and to find the inadequacies and enhancements in cloud infrastructure. This chapter addresses the concerns of evaluating cloud trust management systems, data gathering, and synthesis of theory and data. The conclusion is that the relationship between cloud identity providers and Cloud identity users can greatly benefit from the evaluation and critical review of current trust models

    Formulating Methodology to Build a Trust Framework for Cloud Identity Management

    Get PDF
    The vital element in outsourcing data to the cloud is trust and trustworthiness that information is protected, unaltered and available on demand. To facilitate service expectations efficient and effective infra-structures are required to host the functional processes. A security process is identity management that provides authorization for access rights based on verification checks. In this paper cloud security architecture is reviewed by focusing on the issue of trust and the role of identity management design. Methodology is built to produce cloud artefacts and then it is theoretically applied to produce an innovative solution to assess cloud identity providers (CIdP). A design solution lays out an information security architecture that enhances utility for CIdPs and gives better options for users to make trust decisions in the cloud. The contribution of the research is to provide a generic methodology that may be applied to evaluate other security artefacts for the cloud environment

    Analysing Trust Issues in Cloud Identity Environments

    Get PDF
    Trust acts as a facilitator for decision making in environments, where decisions are subject to risk and uncertainty. Security is one of the factors contributing to the trust model that is a requirement for service users. In this paper we ask, What can be done to improve end user trust in choosing a cloud identity provider? Security and privacy are central issues in a cloud identity environment and it is the end user who determines the amount of trust they have in any identity system. This paper is an in-depth literature survey that evaluates identity service delivery in a cloud environment from the perspective of the service user

    IT Service Management and Incident Management: Literature Review and a Case Study

    Get PDF
    Driving value, alignment between IT and business, manage IT Services, and customer satisfaction are the main objectives for the contemporary Information Technology Service Management (ITSM). ITSM also aims at encouraging harmonization between modern IT technology and ITIL framework regarding service operation. However, most of the companies and organisations struggle to comprehend the ITSM due to the dynamic nature and volume of IT technology and business values. A systematic literature review was conducted to understand the state of the current research in contemporary technology, especially cloud computing, automation, and machine learning. The review indicated that the focus of the existing research is skewed towards the innovative trend of the ITIL process using modern technologies. To demonstrate the findings from the literature, we adopted the case study method based on ITSM theory. Despite the current limitation, we found that most of the companies demonstrate more interest and enthusiasm for IT innovative technologies when it comes to ITIL implementation and ITIL service operatio

    A novel trusted base model for cloud computing using federated identity architecture against identity theft

    Get PDF
    Cloud computing with the many advantages and benefits has been emphasized by many enterprises. Easy access information, quick deployment, cost efficient, greater business agility are some of the cloud advantages. While ease and cost are two great benefits of cloud but Security and technical issue are significant problems of the cloud. This is a vital component of the cloud’s critical infrastructure. Cloud users use this environment to enable numerous online transactions crossways a widespread range of sectors and to exchange information. Especially, identity theft, online fraud, misuse of information should be addressed in the cloud. Increase level of trust is the vital key to decrease identity theft and online fraud. Therefore, cloud vendors should utilize easy-to-use, secure, and efficient identity. Strong Cloud Identity Access Management (IAM) is the best way to deploy trust relationship between users and cloud vendors to guarantee that only authorized users can access to cloud applications. Cloud Identity with Trusted Computing and Trusted Platform Module (TPM) is a strong approach promotes and defines a cloud user’s identity where Relying Parties, users, and Service Providers can trust each other. In this study, trusted Single-sign-On has been proposed to mitigate identity theft in the cloud environment. Security architecture, design, efficient identity and access management solution for cloud applications has been identified. Finally, security and efficiency of the proposed model have been evaluated and analyzed and also it has been compared with some of the existing cloud identity methods

    Satisfying Secure Load Balancing Expectations in the Cloud

    No full text
    Cloud computing relies upon the rapid distribution of data between multiple repositories to give the end user the quality of service that they expect. The data has to be distributed across multiple nodes to assure that no one node becomes a bottleneck. The end user expectation is for seamless and immediate services to support all of their information needs. The cloud service supplier, however, has to manage the available resources in a secure and cost-effective manner to satisfy and keep the customer. Secure Load balancing consequently, impacts the trust an end user may have in the use or purchase of a particular service, and influences the imputed trust and reputation a service supplier may hold. This paper provides a design solution to the tension between the end user and cloud service supplier expectations for secure load balancing by designing a trust evaluation framework in which the competing interests maybe adjudicated

    Defining cloud identity security and privacy issues: A Delphi method

    No full text
    The purpose of this study is to identify the potential security and privacy issues for the entities providing cloud identity services known as cloud identity providers. We document the key security and privacy issues and problems that arise when users and service providers co-operate for cloud service utility. The Delphi method is adopted to facilitate identifying the security and privacy issues in the cloud identity environment. The benefit of using the Delphi method is identification of the issues and prioritizing the relative importance of these issues. A four-round modified Delphi process was applied to a general database of security literature, and then the most relevant articles selected for further analysis. The analysis highlights key issues, advantages and disadvantages of the identity and access management methods; and, risk mitigation mechanisms for identity theft

    Cloud Surfing: A General Comparison of Cloud Identity Guidelines

    No full text
    Identity and access management is an essential component to addressing security issues in cloud. Nowadays, private organizations and government agencies at any level spend billions of dollars in an effort to protect user’ identity and digital access while complying with legislation that mandates the implementation of security measures. This paper intends to illuminate and discusses in more detail three legislative acts: ENISA, CSA and NIST. These guidelines address the significant business and technical decisions that need to be considered by an organization seeking to implement Security as a Service, or an organization that is looking for guidance on how to assess an IAM offering. The current paper provides a brief description of all three legislative acts, a high-level comparison of suggested and/or mandated guidelines (highlighting gaps and overlaps) and suggests a possible threshold model that may incorporate security settings that satisfy requirements of all three legislative acts

    Trusted Computing Strengthens Cloud Authentication

    No full text
    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model
    corecore