2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 2018
DOI: 10.1109/dasc/picom/datacom/cyberscitec.2018.00126
|View full text |Cite
|
Sign up to set email alerts
|

WiP: A Novel Blockchain-Based Trust Model for Cloud Identity Management

Abstract: Secure and reliable management of identities has become one of the greatest challenges facing cloud computing today, mainly due to the huge number of new cloud-based applications generated by this model, which means more user accounts, passwords, and personal information to provision, monitor, and secure. Currently, identity federation is the most useful solution to overcome the aforementioned issues and simplify the user experience by allowing efficient authentication mechanisms and use of identity informatio… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(27 citation statements)
references
References 19 publications
(33 reference statements)
0
27
0
Order By: Relevance
“…There are a block header and a block body in each block. As shown in figure 2, there are six main components in the block header [24]. They are: 1.…”
Section: Blockchain Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…There are a block header and a block body in each block. As shown in figure 2, there are six main components in the block header [24]. They are: 1.…”
Section: Blockchain Architecturementioning
confidence: 99%
“…In this PoW protocol, the longer the chain is, it would be considered an authenticate one. In PoW, miners have to use a lot of computation power to do many computer calculations [24]. This process wastes too much of its resources.…”
Section: Proof-of-workmentioning
confidence: 99%
“…On the other hand, in the past 10 years, many efforts have been taken in protecting PII [19][20][21][22][23][24][25][26][27][28][29]. These approaches target certain issues but still have limitations.…”
Section: The Need For Identity-as-a-servicementioning
confidence: 99%
“…This approach involves the user granting permissions for each SP explicitly. On the other hand, anonymity approaches [20][21][22][23][24], aggregated Zero Knowledge Proofs [25][26][27], and group signatures [28,29] preserve complete anonymity for the user in a transaction with an SP. They require users to interact with an SP over the front-end.…”
Section: Privacy-preserving User Identitymentioning
confidence: 99%
See 1 more Smart Citation