메뉴 건너뛰기




Volumn 2, Issue 1, 2014, Pages

Cloud identity management security issues & solutions: a taxonomy

Author keywords

Assessment criteria; Cloud computing security; Identity management; IDMS taxonomy

Indexed keywords


EID: 85022029828     PISSN: None     EISSN: 21943206     Source Type: Journal    
DOI: 10.1186/s40294-014-0005-9     Document Type: Article
Times cited : (51)

References (81)
  • 10
    • 85051743005 scopus 로고    scopus 로고
    • Online accessed September
    • Brute Force Attack. OWASP Testing Guide2013. [Online accessed September-2013]., [https://www.owasp.org/index.php/Brute_force_attack]
    • (2013) OWASP Testing Guide2013
  • 16
    • 0344197994 scopus 로고    scopus 로고
    • Some forgery attacks on a remote user authentication scheme using smart cards
    • Chang C-C: Some forgery attacks on a remote user authentication scheme using smart cards. Informatica 2003, 14: 289–294. IOS Press, 2003 IOS Press, 2003
    • (2003) Informatica , vol.14 , pp. 289-294
    • Chang, C.-C.1
  • 23
    • 41949139623 scopus 로고    scopus 로고
    • The seven flaws of identity management: usability and security challenges
    • Dhamija R, Dusseault L: The seven flaws of identity management: usability and security challenges. IEEE Secur Privacy 2008, 6: 24–29. IEEE, 2008 IEEE, 2008 10.1109/MSP.2008.49
    • (2008) IEEE Secur Privacy , vol.6 , pp. 24-29
    • Dhamija, R.1    Dusseault, L.2
  • 25
    • 85051694004 scopus 로고    scopus 로고
    • [Online accessed August-2014]
    • Eucalyptus Systems, Inc.: Eucalyptus Identity and Access Management (IAM)2012., [Online accessed August-2014]., [https://www.eucalyptus.com/docs/eucalyptus/4.0/security-guide/security_bp_access.html]
    • (2012) Eucalyptus Identity and Access Management (IAM)
  • 26
    • 78649885971 scopus 로고    scopus 로고
    • Analysis of integrity vulnerabilities and a non-repudiation protocol for cloud data storage platforms
    • IEEE, Piscataway, New Jersey, United States
    • Feng J, Chen Y, Ku WS, Liu P: Analysis of integrity vulnerabilities and a non-repudiation protocol for cloud data storage platforms. In Parallel Processing Workshops (ICPPW), 2010 39th International Conference on. IEEE, Piscataway, New Jersey, United States; 2010:251–258
    • (2010) Parallel Processing Workshops (ICPPW), 2010 39th International Conference on , pp. 251-258
    • Feng, J.1    Chen, Y.2    Ku, W.S.3    Liu, P.4
  • 29
    • 78650573573 scopus 로고    scopus 로고
    • Cloud computing identity management
    • Gopalakrishnan A: Cloud computing identity management. SETLabs Briefings 2009, 7: 45–54
    • (2009) SETLabs Briefings , vol.7 , pp. 45-54
    • Gopalakrishnan, A.1
  • 33
    • 79952952264 scopus 로고    scopus 로고
    • Cloud hooks: Security and privacy issues in cloud computing
    • IEEE, Piscataway, New Jersey, United States
    • Jansen WA: Cloud hooks: Security and privacy issues in cloud computing. In System Sciences (HICSS), 2011 44th Hawaii International Conference on. IEEE, Piscataway, New Jersey, United States; 2011:1–10
    • (2011) System Sciences (HICSS), 2011 44th Hawaii International Conference on , pp. 1-10
    • Jansen, W.A.1
  • 41
    • 84891065445 scopus 로고    scopus 로고
    • Multi-tenancy authorization system with federated identity for cloud-based environments using shibboleth
    • Leandro, MA, Nascimento TJ, dos Santos DR, Westphall CM, Westphall CB: Multi-tenancy authorization system with federated identity for cloud-based environments using shibboleth. In ICN 2012, The Eleventh International Conference on Networks; 2012:88–93
    • (2012) ICN 2012, The Eleventh International Conference on Networks , pp. 88-93
    • Leandro, M.A.1    Nascimento, T.J.2
  • 43
    • 84872006849 scopus 로고    scopus 로고
    • Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
    • Springer, Berlin, Heidelberg
    • Li M, Yu S, Ren K, Lou W: Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In Security and Privacy in Communication Networks. Springer, Berlin, Heidelberg; 2010:89–106
    • (2010) Security and Privacy in Communication Networks , pp. 89-106
    • Li, M.1    Yu, S.2    Ren, K.3    Lou, W.4
  • 51
    • 10044293457 scopus 로고    scopus 로고
    • Comparing passwords, tokens, and biometrics for user authentication
    • IEEE, Piscataway, New Jersey, United States
    • O’Gorman L: Comparing passwords, tokens, and biometrics for user authentication. In Proceedings of the IEEE. IEEE, Piscataway, New Jersey, United States; 2003:2021–2040
    • (2003) Proceedings of the IEEE , pp. 2021-2040
    • O’Gorman, L.1
  • 52
    • 79952925128 scopus 로고    scopus 로고
    • Architecting a cloud-scale identity fabric
    • Olden E: Architecting a cloud-scale identity fabric. Computer 2011, 44: 52–59. IEEE, 2011 IEEE, 2011 10.1109/MC.2011.60
    • (2011) Computer , vol.44 , pp. 52-59
    • Olden, E.1
  • 53
    • 63449115454 scopus 로고    scopus 로고
    • A taxonomy of single sign-on systems
    • Springer, Berlin, Heidelberg
    • Pashalidis A, Mitchell CJ: A taxonomy of single sign-on systems. In Information Security and Privacy. Springer, Berlin, Heidelberg; 2003:249–264
    • (2003) Information Security and Privacy , pp. 249-264
    • Pashalidis, A.1    Mitchell, C.J.2
  • 56
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • Ratha NK, Connell JH, Bolle RM: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 2001, 40: 614–634. IBM, 2001 IBM, 2001 10.1147/sj.403.0614
    • (2001) IBM Syst J , vol.40 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 60
    • 84859045783 scopus 로고    scopus 로고
    • Enhancing privacy and dynamic federation in IdM for consumer cloud computing
    • Sanchez R, Almenares F, Arias P, Diaz-Sanchez D, Marín A: Enhancing privacy and dynamic federation in IdM for consumer cloud computing. IEEE Trans Consum Electron 2012, 58: 95–103. IEEE, 2012 IEEE, 2012 10.1109/TCE.2012.6170060
    • (2012) IEEE Trans Consum Electron , vol.58 , pp. 95-103
    • Sanchez, R.1    Almenares, F.2    Arias, P.3    Diaz-Sanchez, D.4    Marín, A.5
  • 61
    • 0036870280 scopus 로고    scopus 로고
    • SIP security issues: the SIP authentication procedure and its processing load
    • Salsano S, Veltri L, Papalilo D: SIP security issues: the SIP authentication procedure and its processing load. Network 2002, 16: 38–44. IEEE, 2002 IEEE, 2002
    • (2002) Network , vol.16 , pp. 38-44
    • Salsano, S.1    Veltri, L.2    Papalilo, D.3
  • 62
    • 77957948993 scopus 로고    scopus 로고
    • Quirc: A quantitative impact and risk assessment framework for cloud security
    • IEEE, Piscataway, New Jersey, United States
    • Saripalli P, Walters B: Quirc: A quantitative impact and risk assessment framework for cloud security. In Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on. IEEE, Piscataway, New Jersey, United States; 2010:280–288
    • (2010) Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on , pp. 280-288
    • Saripalli, P.1    Walters, B.2
  • 64
    • 80455173609 scopus 로고    scopus 로고
    • Biometric Authentication as a service for enterprise identity management deployment: a data protection perspective
    • IEEE, Piscataway, New Jersey, United States
    • Senk C, Dotzler F: Biometric Authentication as a service for enterprise identity management deployment: a data protection perspective. In Availability, Reliability and Security (ARES), 2011 Sixth International Conference on. IEEE, Piscataway, New Jersey, United States; 2011:43–50
    • (2011) Availability, Reliability and Security (ARES), 2011 Sixth International Conference on , pp. 43-50
    • Senk, C.1    Dotzler, F.2
  • 67
    • 1642390522 scopus 로고    scopus 로고
    • User provisioning with SPML
    • Sodhi G: User provisioning with SPML. Inf Secur Tech Rep 2004, 9(1):86–96. 10.1016/S1363-4127(04)00018-4
    • (2004) Inf Secur Tech Rep , vol.9 , Issue.1 , pp. 86-96
    • Sodhi, G.1
  • 68
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • Subashini S, Kavitha V: A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 2011, 34: 1–11. Elsevier Elsevier 10.1016/j.jnca.2010.07.006
    • (2011) J Netw Comput Appl , vol.34 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 69
    • 59249091249 scopus 로고    scopus 로고
    • A user-centric federated single sign-on system
    • Suriadi S, Foo E, Jøsang A: A user-centric federated single sign-on system. J Netw Comput Appl 2009, 32: 388–401. Elsevier, 2009 Elsevier, 2009 10.1016/j.jnca.2008.02.016
    • (2009) J Netw Comput Appl , vol.32 , pp. 388-401
    • Suriadi, S.1    Foo, E.2    Jøsang, A.3
  • 73
    • 78650288030 scopus 로고    scopus 로고
    • New identity-based proxy re-encryption schemes to prevent collusion attacks
    • Springer, Berlin, Heidelberg
    • Wang L, Wang L, Mambo M, Okamoto E: New identity-based proxy re-encryption schemes to prevent collusion attacks. In Pairing-Based Cryptography-Pairing 2010. Springer, Berlin, Heidelberg; 2010:327–346
    • (2010) Pairing-Based Cryptography-Pairing 2010 , pp. 327-346
    • Wang, L.1    Wang, L.2    Mambo, M.3    Okamoto, E.4
  • 74
    • 33750059230 scopus 로고    scopus 로고
    • O’Reilly Media, Inc., Sebastopol, CA, USA
    • Windley PJ: Digital Identity. O’Reilly Media, Inc., Sebastopol, CA, USA; 2005
    • (2005) Digital Identity
    • Windley, P.J.1
  • 75
    • 71749086537 scopus 로고    scopus 로고
    • Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
    • Springer, Berlin, Heidelberg
    • Yan L, Rong C, Zhao G: Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography. In Cloud Computing. Springer, Berlin, Heidelberg; 2009:167–177
    • (2009) Cloud Computing , pp. 167-177
    • Yan, L.1    Rong, C.2    Zhao, G.3
  • 76
    • 84864767404 scopus 로고    scopus 로고
    • Efficient password-based two factors authentication in cloud computing
    • Yassin AA, Jin H, Ibrahim A, Qiang W, Zou D: Efficient password-based two factors authentication in cloud computing. Int J Secur Appl 2012, 6: 143–148
    • (2012) Int J Secur Appl , vol.6 , pp. 143-148
    • Yassin, A.A.1    Jin, H.2    Ibrahim, A.3    Qiang, W.4    Zou, D.5
  • 79
    • 77957890452 scopus 로고    scopus 로고
    • Universal identity management model based on anonymous credentials
    • IEEE, Piscataway, New Jersey, United States
    • Zhang Y, Chen JL: Universal identity management model based on anonymous credentials. In Services Computing (SCC), 2010 IEEE International Conference on. IEEE, Piscataway, New Jersey, United States; 2010:305–312
    • (2010) Services Computing (SCC), 2010 IEEE International Conference on , pp. 305-312
    • Zhang, Y.1    Chen, J.L.2
  • 80
    • 79959557055 scopus 로고    scopus 로고
    • Addressing cloud computing security issues
    • Zissis D, Lekkas D: Addressing cloud computing security issues. Future Generat Comput Syst 2012, 28: 583–592. Elsevier, 2012 Elsevier, 2012 10.1016/j.future.2010.12.006
    • (2012) Future Generat Comput Syst , vol.28 , pp. 583-592
    • Zissis, D.1    Lekkas, D.2
  • 81
    • 56549095250 scopus 로고    scopus 로고
    • Side-channel attacks: ten years after its publication and the impacts on cryptographicmodule security testing
    • Zhou, Y, Feng D: Side-channel attacks: ten years after its publication and the impacts on cryptographic module security testing. In IACR Cryptology ePrint Archive, Volume 2005; 2005:388
    • (2005) IACR Cryptology ePrint Archive, Volume 2005 , pp. 388
    • Zhou, Y.1    Feng, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.