Open Access Open Access  Restricted Access Subscription or Fee Access

User-Controlled Privacy Preserving Identity Management for Cloud Computing

Viswanathan Pachaiyappan, R. Chandrasekar

Abstract


Cloud computing has recently reached popularity and developed into a major trend in IT world. Several challenges are being raised from the adoption of this computational paradigm including security and privacy. Identity Management (IDM) is one of the core components in cloud privacy and security which can ease some of the problems associated with cloud computing. Users must provide sensitive information i.e., Personally Identifiable Information (PII) which uniquely identifies them, to authenticate to Cloud Service Providers (CSPs) in order to get the requested service. However, users can still experience privacy infringement because users cannot have direct control over the exchange of PII between CSPs. The approach proposed in this paper preserves the privacy in identity management. The technique is based on Zero Knowledge Proof of Knowledge (ZKPK) where a user is authenticated to CSP without disclosing PII. Once a user is authenticated, user releases appropriate PII based on computed trust level of CSP. Thereafter, CSP provides requested service to user.

Keywords


Cloud Computing, Identity Management, Privacy, Personally Identifiable Information (PII), Zero Knowledge Proof of Knowledge (ZKPK).

Full Text:

PDF

References


Elisa Bertino, Federica Paci, Rodolfo Ferrini and Ning Shang, "Privacy-preserving Digital Identity Management for Cloud Computing,” Bulletin of the IEEE Computer Society Technical Committee on Data Engineering, Special Issue on Data Management on Cloud Computing Platforms, vol.32, no.1, pp. 21-27, March, 2009.

Ilango Sriram and Ali Khajeh-Hosseini, “Research Agenda in Cloud Technologies,” ACM Symposium on Cloud Computing, Indianapolis, USA, June, 2010.

Hassan Takabi, James B.D. Joshi, Gail-Joon Ahn, “Security and Privacy Challenges in Cloud Computing Environments,” IEEE Security and Privacy, vol. 8, no. 6, pp. 24-31, November/December 2010.

Pelin Angin, Bharat Bhargava, Rohit Ranchal, Noopur Singh, Lotfi Ben Othmane, Leszek T. Lilien and Mark Linderman, “An Entity-centric Approach for Privacy and Identity Management in Cloud Computing,” 29th IEEE International Symposium on Reliable Distributed Systems, pp.177-183, New Delhi, November, 2010.

Rohit Ranchal, Bharat Bhargava, Lotfi Ben Othmane, Leszek Lilien, Anya Kim, Myong Kang, Mark Linderman, “Protection of Identity Management in Cloud Computing,” 29th IEEE International Symposium on Reliable Distributed Systems Workshop, pp.368-372, New Delhi, November, 2010.

Joseph M.Kizza, “Feige-Fiat-Shamir ZKP Scheme,” International Journal of Computing and ICT Research, vol.4, no.1, pp. 9-19, June 2010.

Audun Josang, Roslan Ismail, Colin Boyd, “A Survey of Trust and Reputation Systems for Online Service Provision,” Decision Support Systems, vol.43, no.2, pp.618-644, March 2007.

Behrouz A. Forouzan, Cryptography and Network Security, Special Indian Edition, Tata McGraw-Hill, 2007.

S. Hubner. PRIME, https://www.prime-project.eu/. 2010.

W. Alrodhan and C. Mitchell. Improving the Security of CardSpace, EURASIP Journal on Information Security, 2009.

OPENID, http://openid.net/, 2010.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.