CloudSim Framework for Federation of identity management in Cloud Computing

Main Article Content

Rohit Shere
Sonika Shrivastava
R.K. Pateriya

Abstract

Cloud computing is built on several components for managing and making provision of abundant resources to business, on demand. Identity management is the essential element in cloud computing, and it is an inevitable standard security module that keeps away unauthorized users with unintentional interference to the system. The majority of work is being done to enhance this identity management component to overcome current limitations in authentication mechanisms. Federation among different clouds can be helpful in minimizing overhead and cost in overall identity management. Many cloud service providers are present in the industry with their independent identity management, but very few of them supports the federation among themselves to tackle the whole business collapse situation due to any disaster caused by nature. The Federation among these vendors can bring healthy competition in business markets that will lead to boost the confidence of cloud user in cloud computing. In this paper, our research work addresses a framework for researchers in identity management in cloud computing. The framework takes minimal effort and time for creating and simulating test environment for the generalized cloud environment.

Article Details

How to Cite
[1]
Rohit Shere, Sonika Shrivastava, and R.K. Pateriya, “CloudSim Framework for Federation of identity management in Cloud Computing”, Int. J. Comput. Eng. Res. Trends, vol. 4, no. 6, pp. 269–276, Jun. 2017.
Section
Research Articles

References

Hong Liu, Student Member, IEEE, Huansheng Ning, Senior Member, IEEE, Qingxu Xiong, Member,IEEE, and Laurence T. Yang, Member, IEEE2014, “Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing.â€

Adleman, L., “A subexponential algorithm for the discrete logarithm problem with application to cryptographyâ€, Proc. 20th IEEE Found. Comp. Sci. Symp., 1979, 55-60.

Ganeshan R. et.al, “Performance analysis of Hyper-Elliptic Curve Cryptosystems over Finite Fields Fp for Genus 2 & 4â€, IJCSNS Vol. 8 No. 12, Dec 2008

“The Notorious Nine - Cloud Computing Top Threats in 2013,†https://downloads.cloudsecurityalliance.org/initiatives/top_threats“Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud,†IEEE Transactions on Services Computing, VOL. X, NO. X, XXXX 2014, accepted.

Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou, “A Hybrid Cloud Approach for Secure Authorized Deduplicationâ€, IEEE Transactions on Parallel and Distributed Systems, 2014.

Lluis Pamies-Juarez, Pedro Garcia-Lopez, Marc Sanchez-Artigas, Blas Herrera, “Towards the Design of Optimal Data Redundancy Schemes for Heterogeneous Cloud Storage Infrastructures†,†Computer Networks, Vol.55, 1100-1113, 2011.

Deyan Chen, Hong Zhao, “Data Security and Privacy Protection Issues in Cloud Computingâ€, International Conference on Computer Science and Electronics Engineering 2012.

K. Ren, C. Wang, and Q. Wang, “Security Challenges for the Public Cloud,†IEEE Internet Computing, vol. 16, no. 1, pp. 69–73,2012.

Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, Jin Li, â€Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computingâ€, Proc. IEEE transactions on parallel and distributed systems, vol. 22, no. 5, may 2011 .

OASIS: Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS Standard (2005)

Benjain Ertl, "Identity Harmonization for Federated HPC, Grid and Cloud Services", IEEE, pp. 621-627, 2016.

Jaweher Zouari, "An Identity as a service framework for the cloud", IEEE, pp. 1-5, 2016.

Yong Yu, "Identity based Remote Data Integrity hacking with perfect data privacy preserving for cloud storage", IEEE, pp. 1-11, 2016.