Abstract

Cloud computing paradigm is a service oriented system that delivers services to the customer at low cost. Cloud computing needs to address three main security issues: confidentiality, integrity and availability. In this paper, we propose user identity management protocol for cloud computing customers and cloud service providers. This protocol will authenticate and authorize customers/providers in other to achieve global security networks. The protocol will be developed to achieve the set global security objectives in cloud computing environments. Confidentiality, integrity and availability are the key challenges of web services’ or utility providers. A layered protocol design is proposed for cloud computing systems, the physical, networks and application layer. However, each layer will integrate existing security features such as firewalls, NIDS, NIPS, Anti-DDOS and others to prevent security threats and attacks. System vulnerability is critical to the cloud computing facilities; the proposed protocol will address this as part of measures to secure data at all levels. The protocol will protect customers/cloud service providers’ infrastructure by preventing unauthorized users to gain access to the service/facility.

Highlights

  • In cloud computing, resources are provided as a service over the Internet to customers who use them as when needed basis

  • The results show that when 100 tests were performed for the successful and failed attributes

  • We presented user-IDM protocol (U-IDM) protocol that will accommodate all the stakeholders

Read more

Summary

Introduction

Resources are provided as a service over the Internet to customers who use them as when needed basis. Maturing cloud capabilities into more advanced offerings, such as virtual supply chains, requires support for fully abstracted, policy-driven interactions across clouds It will become a major challenge for the cloud providers to adequately model, expose and extend policies in order to provide integrated services across distributed and heterogeneous business processes and infrastructure. The data associated with these business processes and infrastructure will need to be managed appropriately to address and mitigate various risks from a security, privacy, and regulatory compliance perspective. This is important as intellectual property, customer, em-. The federated IDM need to be enhanced high level of security

Benefits of Cloud Computing
Deployment Models of Cloud Computing
Overview
Security
Information Security
Network Security Attributes of Cloud Computing
User Identity Management
Identity and Access Management
Identity and Access Management Systems Offered to the Cloud Customer
Related Works
Theoretical Framework
Cloud Services’ Providers
Cloud Services’ Registry
Cloud Services Customers
Simulations
Results and Discussion
Conclusion and Future Work

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.