CloudSim Framework for Federation of identity management in Cloud Computing
Main Article Content
Abstract
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
IJCERT Policy:
The published work presented in this paper is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. This means that the content of this paper can be shared, copied, and redistributed in any medium or format, as long as the original author is properly attributed. Additionally, any derivative works based on this paper must also be licensed under the same terms. This licensing agreement allows for broad dissemination and use of the work while maintaining the author's rights and recognition.
By submitting this paper to IJCERT, the author(s) agree to these licensing terms and confirm that the work is original and does not infringe on any third-party copyright or intellectual property rights.
References
Hong Liu, Student Member, IEEE, Huansheng Ning, Senior Member, IEEE, Qingxu Xiong, Member,IEEE, and Laurence T. Yang, Member, IEEE2014, “Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing.â€
Adleman, L., “A subexponential algorithm for the discrete logarithm problem with application to cryptographyâ€, Proc. 20th IEEE Found. Comp. Sci. Symp., 1979, 55-60.
Ganeshan R. et.al, “Performance analysis of Hyper-Elliptic Curve Cryptosystems over Finite Fields Fp for Genus 2 & 4â€, IJCSNS Vol. 8 No. 12, Dec 2008
“The Notorious Nine - Cloud Computing Top Threats in 2013,†https://downloads.cloudsecurityalliance.org/initiatives/top_threats“Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud,†IEEE Transactions on Services Computing, VOL. X, NO. X, XXXX 2014, accepted.
Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou, “A Hybrid Cloud Approach for Secure Authorized Deduplicationâ€, IEEE Transactions on Parallel and Distributed Systems, 2014.
Lluis Pamies-Juarez, Pedro Garcia-Lopez, Marc Sanchez-Artigas, Blas Herrera, “Towards the Design of Optimal Data Redundancy Schemes for Heterogeneous Cloud Storage Infrastructures†,†Computer Networks, Vol.55, 1100-1113, 2011.
Deyan Chen, Hong Zhao, “Data Security and Privacy Protection Issues in Cloud Computingâ€, International Conference on Computer Science and Electronics Engineering 2012.
K. Ren, C. Wang, and Q. Wang, “Security Challenges for the Public Cloud,†IEEE Internet Computing, vol. 16, no. 1, pp. 69–73,2012.
Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, Jin Li, â€Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computingâ€, Proc. IEEE transactions on parallel and distributed systems, vol. 22, no. 5, may 2011 .
OASIS: Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS Standard (2005)
Benjain Ertl, "Identity Harmonization for Federated HPC, Grid and Cloud Services", IEEE, pp. 621-627, 2016.
Jaweher Zouari, "An Identity as a service framework for the cloud", IEEE, pp. 1-5, 2016.
Yong Yu, "Identity based Remote Data Integrity hacking with perfect data privacy preserving for cloud storage", IEEE, pp. 1-11, 2016.