Abstract

Since the era’s of Cloud computing beginning, the Identity Management is considered as a permanent challenge especially for the hybrid IT environments that permit for many users’ applications to share the same data center depending on servers’ virtualization. This paper introduces a complete study about Identity forms in different domains and applications. Also, a performance evaluation of new approaches for Virtual Identity was done. Actually, Virtual Identity, a new terminology used in virtual environments, was introduced to enhance the anonymous communication in such types of complex networks. Based on the work analysis and motivations done through an online survey, two techniques were used to implement the Virtual Identity; Identity Based Encryption (IBE) and Pseudonym Based Encryption (PBE). Both techniques were validated using MIRACL library for security algorithms. In addition, the performance of both approaches was evaluated under different configurations and network conditions through OPNET Modeler. The results showed the impact of the number of cloud users and their locations (either local or remote) on the application response time in cloud environments using the proposed virtual identities. Moreover, Application Characterization Environment whiteboard was used to simulate the overall flow of data across different tiers from start to end of the application task for Virtual Identity creation. The results and outcomes for both methodologies showed that they are suitable paradigm for achieving high degree of security and efficiency in such sophisticated network access to many online services and applications.

Highlights

  • INTRODUCTIONThe Internet is inundated by data generated from different sources. Users share personal details, opinions, videos, pictures and very often their identities for each service with public or even their friends

  • Nowadays, the Internet is inundated by data generated from different sources

  • Three case studies of trusted service providers such as financial institutions, governments and mobile operators are discussed hereafter. They are well-placed to offer the importance of identity management services for providing the high-security and high-reliability authentication [18]: a) Financial Institutions: Financial institutions around the world recognized the risk in online transactions where the parties never meet

Read more

Summary

INTRODUCTION

The Internet is inundated by data generated from different sources. Users share personal details, opinions, videos, pictures and very often their identities for each service with public or even their friends. A secure communication is established by creating this virtual identity using a triangle negotiation between the user, the Private Key Generator (PKG) and the service Provider (SP). This process is followed the Identity-Based Cryptography (IBC) methodology either using IBE or PBE techniques. Both techniques effects in Virtual Identity (VID) generation are simulated to confirm the solution feasibility for cloud service access. Disclosed by real time attacks as the cleaning is done after the browser is closed

RELATED WORK AND BACKGROUND
Identity Categories Two identity categories are discussed
Identity Challenges
Work Motivations
PROPOSED VIRTUAL IDENTITY MECHANISMS
The Second Approach using Pseudonym Based Encryption
Processing time for IBE and PBE resulting from MIRACL
PERFORMANCE EVALUATION USING OPNET MODELER
Network Model Scenarios
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call