2013 9th International Conference on Innovations in Information Technology (IIT) 2013
DOI: 10.1109/innovations.2013.6544386
|View full text |Cite
|
Sign up to set email alerts
|

Identity management framework for cloud networking infrastructure

Abstract: The Cloud Networking(CloNe) infrastructure provisions elastic, secure, and on-demand virtualized network resources to the end user. It incorporates the Network-as-a-Service(NaaS) provisioning model, which enhances network-level scalability, throughput, and performance. In this paper, we extend the CloNe architecture by designing, deploying, and integrating an identity management framework, customized for the CloNe infrastructure. The identity management framework proposed in this paper, is based on the User Ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 5 publications
0
7
0
Order By: Relevance
“…and its core notion is to implement the bilinear pairing given in (6). In Algorithm 2, EIP196 stands for the precompiled library of Ethereum able to implement elliptic curve addition and Scalar multiplication, and EIP197 stands for the precompiled library able to implement elliptic curve bilinear pairing.…”
Section: Te Generation Of Zkp and Construction Of Verifcationmentioning
confidence: 99%
See 1 more Smart Citation
“…and its core notion is to implement the bilinear pairing given in (6). In Algorithm 2, EIP196 stands for the precompiled library of Ethereum able to implement elliptic curve addition and Scalar multiplication, and EIP197 stands for the precompiled library able to implement elliptic curve bilinear pairing.…”
Section: Te Generation Of Zkp and Construction Of Verifcationmentioning
confidence: 99%
“…Te architecture has inherent disadvantages such as centralization in the storage and management of identity information, single point failure, poor self-sovereignty management of the user's identity, nontransparent verifcation and authorization of identity, and so on. Te disadvantages mentioned above still exist despite the fact that some corresponding federal authorization frameworks, such as OpenID [5], UMA [6], and OAuth [7], and twofactor [8] or three-factor security [9] authentication-system based on smart cards have been proposed consecutively.…”
Section: Introductionmentioning
confidence: 99%
“…It provides a user centric authentication by clinching unidentified authentication access control. [15] proposed an identity management framework to disburse access control across multiple cloud service providers. One of the security deportment with the cloud is breach of trust, so service level agreements need to be countersigned from the client and service provider.…”
Section: Cloudthingsmentioning
confidence: 99%
“…Dhungana et al [18] extends the CloNe architecture [19] by designing, deploying, and integrating an identity management framework customised for the CloNe infrastructure. It is based on the UMA protocol, supporting authentication, authorisation, and identity management of entities in the CloNe infrastructure and enabling federated identity management and management of access control policies across different infrastructure providers.…”
Section: B Identity Management Systemsmentioning
confidence: 99%