4th IEEE International Conference on Cloud Computing Technology and Science Proceedings 2012
DOI: 10.1109/cloudcom.2012.6427513
|View full text |Cite
|
Sign up to set email alerts
|

A survey on security issues of federated identity in the cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(17 citation statements)
references
References 3 publications
0
17
0
Order By: Relevance
“…Li et al [2011a] propose the design of a hierarchical architecture for cloud computing that employs identity-based cryptography to support both data confidentiality and user authentication. Ghazizadeh et al [2012] analyze security issues that could affect federated identity and single signon in the cloud, and present some models that could be used to counteract identity theft in federated environments. propose the use of Merkle trees [Carminati 2009] to provide authentication for IRIS, an authenticated cloud-based file system.…”
Section: Authenticationmentioning
confidence: 99%
“…Li et al [2011a] propose the design of a hierarchical architecture for cloud computing that employs identity-based cryptography to support both data confidentiality and user authentication. Ghazizadeh et al [2012] analyze security issues that could affect federated identity and single signon in the cloud, and present some models that could be used to counteract identity theft in federated environments. propose the use of Merkle trees [Carminati 2009] to provide authentication for IRIS, an authenticated cloud-based file system.…”
Section: Authenticationmentioning
confidence: 99%
“…If an attacker could fake or steal these credentials, the cloud system will suffer from spoofing attacks [2]. In MCC, the problem is even severe because mobile devices often lack computing power to execute complex security algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…In order to answer these questions, several security based FIM systems have been designed and implemented. But, to the best of our knowledge, none of those systems offer a holistic solution covering self-service, privacy and real-time synchronization features for Cloud computing environments [4]. In addition to this, most of the existing software applications are bundled with proprietary identity management services and authentication mechanisms.…”
Section: Introductionmentioning
confidence: 98%