Abstract
Since the era’s of Cloud computing beginning, the Identity Management is considered as a permanent challenge especially for the hybrid IT environments that permit for many users’ applications to share the same data center depending on servers’ virtualization. This paper introduces a complete study about Identity forms in different domains and applications. Also, a performance evaluation of new approaches for Virtual Identity was done. Actually, Virtual Identity, a new terminology used in virtual environments, was introduced to enhance the anonymous communication in such types of complex networks. Based on the work analysis and motivations done through an online survey, two techniques were used to implement the Virtual Identity; Identity Based Encryption (IBE) and Pseudonym Based Encryption (PBE). Both techniques were validated using MIRACL library for security algorithms. In addition, the performance of both approaches was evaluated under different configurations and network conditions through OPNET Modeler. The results showed the impact of the number of cloud users and their locations (either local or remote) on the application response time in cloud environments using the proposed virtual identities. Moreover, Application Characterization Environment whiteboard was used to simulate the overall flow of data across different tiers from start to end of the application task for Virtual Identity creation. The results and outcomes for both methodologies showed that they are suitable paradigm for achieving high degree of security and efficiency in such sophisticated network access to many online services and applications.
Highlights
INTRODUCTIONThe Internet is inundated by data generated from different sources. Users share personal details, opinions, videos, pictures and very often their identities for each service with public or even their friends
Nowadays, the Internet is inundated by data generated from different sources
Three case studies of trusted service providers such as financial institutions, governments and mobile operators are discussed hereafter. They are well-placed to offer the importance of identity management services for providing the high-security and high-reliability authentication [18]: a) Financial Institutions: Financial institutions around the world recognized the risk in online transactions where the parties never meet
Summary
The Internet is inundated by data generated from different sources. Users share personal details, opinions, videos, pictures and very often their identities for each service with public or even their friends. A secure communication is established by creating this virtual identity using a triangle negotiation between the user, the Private Key Generator (PKG) and the service Provider (SP). This process is followed the Identity-Based Cryptography (IBC) methodology either using IBE or PBE techniques. Both techniques effects in Virtual Identity (VID) generation are simulated to confirm the solution feasibility for cloud service access. Disclosed by real time attacks as the cleaning is done after the browser is closed
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have