2014
DOI: 10.15439/2014f465
|View full text |Cite
|
Sign up to set email alerts
|

Identity Providers-as-a-Service built as Cloud-of-Clouds: challenges and opportunities

Abstract: Abstract-In our previous work we designed and evaluated the feasibility of highly secure and dependable identity providers (IdPs) for the increasing requirements of future IT infrastructures. In this position paper we extend our previous work by analyzing and discussing the benefits of deploying highly secure and dependable identity providers-as-a-service (IdP-as-aService), without compromising the confidentiality of sensitive data and operations. In order to achieve this goal, we discuss some of the forefront… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
3
3

Relationship

3
3

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…C-BAS [520] is a certificate-based AAA (Authentication, Authorization and Accounting) architecture for improving the security control on SDN experimental facilities. Solutions in the spirit of C-BAS can be made highly secure and dependable through hybrid system architectures, which combine different technologies and techniques from distributed systems, security, and fault and intrusion tolerance [522], [523], [524].…”
Section: Flow Aggregationmentioning
confidence: 99%
“…C-BAS [520] is a certificate-based AAA (Authentication, Authorization and Accounting) architecture for improving the security control on SDN experimental facilities. Solutions in the spirit of C-BAS can be made highly secure and dependable through hybrid system architectures, which combine different technologies and techniques from distributed systems, security, and fault and intrusion tolerance [522], [523], [524].…”
Section: Flow Aggregationmentioning
confidence: 99%
“…For 20 clients we achieve a throughput of 26 authentications per second, while around 92 authentication/s for 80 clients. This throughput can easily support an university environment with more than 20k users, which has an average of approximately 40 authentications/s [30]. Yet, if we consider our best case from UFAM-VMs, 995.12 authentications/s, our system, without any further optimizations or more computing power, is capable of supporting an environment (considering the average authentications/s) with more than 200k users.…”
Section: B Performance Of the System In Different Environmentsmentioning
confidence: 97%
“…Lastly, the Oregon's VM was running Ubuntu Server 12.04 LTS. It is worth mentioning that using secure elements (or cryptographic techniques) in public clouds brings additional challenges if we cannot completely trust on the cloud provider (even with a contract establishing confidentiality and privacy guarantees), as we further discuss in [30]. Table III summarizes the main results of our first performance evaluation.…”
Section: B Performance Of the System In Different Environmentsmentioning
confidence: 99%
“…C-BAS [520] is a certificate-based AAA (Authentication, Authorization and Accounting) architecture for improving the security control on SDN experimental facilities. Solutions in the spirit of C-BAS can be made highly secure and dependable through hybrid system architectures, which combine different technologies and techniques from distributed systems, security, and fault and intrusion tolerance [522], [523], [524].…”
Section: Rate Limitingmentioning
confidence: 99%