A novel trusted base model for cloud computing using federated identity architecture against identity theft

Cloud computing with the many advantages and benefits has been emphasized by many enterprises. Easy access information, quick deployment, cost efficient, greater business agility are some of the cloud advantages. While ease and cost are two great benefits of cloud but Security and technical issue ar...

Full description

Saved in:
Bibliographic Details
Main Author: Ghazizadeh, Eghbal
Format: Thesis
Language:English
Published: 2013
Subjects:
Online Access:http://eprints.utm.my/id/eprint/48146/1/EghbalGhazizadehMFC2013.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utm-ep.48146
record_format uketd_dc
spelling my-utm-ep.481462017-08-21T01:25:48Z A novel trusted base model for cloud computing using federated identity architecture against identity theft 2013 Ghazizadeh, Eghbal, QA76 Computer software Cloud computing with the many advantages and benefits has been emphasized by many enterprises. Easy access information, quick deployment, cost efficient, greater business agility are some of the cloud advantages. While ease and cost are two great benefits of cloud but Security and technical issue are significant problems of the cloud. This is a vital component of the cloud’s critical infrastructure. Cloud users use this environment to enable numerous online transactions crossways a widespread range of sectors and to exchange information. Especially, identity theft, online fraud, misuse of information should be addressed in the cloud. Increase level of trust is the vital key to decrease identity theft and online fraud. Therefore, cloud vendors should utilize easy-to-use, secure, and efficient identity. Strong Cloud Identity Access Management (IAM) is the best way to deploy trust relationship between users and cloud vendors to guarantee that only authorized users can access to cloud applications. Cloud Identity with Trusted Computing and Trusted Platform Module (TPM) is a strong approach promotes and defines a cloud user’s identity where Relying Parties, users, and Service Providers can trust each other. In this study, trusted Single-sign-On has been proposed to mitigate identity theft in the cloud environment. Security architecture, design, efficient identity and access management solution for cloud applications has been identified. Finally, security and efficiency of the proposed model have been evaluated and analyzed and also it has been compared with some of the existing cloud identity methods. 2013 Thesis http://eprints.utm.my/id/eprint/48146/ http://eprints.utm.my/id/eprint/48146/1/EghbalGhazizadehMFC2013.pdf application/pdf en public http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:81843?queryType=vitalDismax&query=A+novel+trusted+base+model+for+cloud+computing+using+federated+identity+architecture+against+identity+theft&public=true masters Universiti Teknologi Malaysia, Faculty of Computing Faculty of Computing
institution Universiti Teknologi Malaysia
collection UTM Institutional Repository
language English
topic QA76 Computer software
spellingShingle QA76 Computer software
Ghazizadeh, Eghbal,
A novel trusted base model for cloud computing using federated identity architecture against identity theft
description Cloud computing with the many advantages and benefits has been emphasized by many enterprises. Easy access information, quick deployment, cost efficient, greater business agility are some of the cloud advantages. While ease and cost are two great benefits of cloud but Security and technical issue are significant problems of the cloud. This is a vital component of the cloud’s critical infrastructure. Cloud users use this environment to enable numerous online transactions crossways a widespread range of sectors and to exchange information. Especially, identity theft, online fraud, misuse of information should be addressed in the cloud. Increase level of trust is the vital key to decrease identity theft and online fraud. Therefore, cloud vendors should utilize easy-to-use, secure, and efficient identity. Strong Cloud Identity Access Management (IAM) is the best way to deploy trust relationship between users and cloud vendors to guarantee that only authorized users can access to cloud applications. Cloud Identity with Trusted Computing and Trusted Platform Module (TPM) is a strong approach promotes and defines a cloud user’s identity where Relying Parties, users, and Service Providers can trust each other. In this study, trusted Single-sign-On has been proposed to mitigate identity theft in the cloud environment. Security architecture, design, efficient identity and access management solution for cloud applications has been identified. Finally, security and efficiency of the proposed model have been evaluated and analyzed and also it has been compared with some of the existing cloud identity methods.
format Thesis
qualification_level Master's degree
author Ghazizadeh, Eghbal,
author_facet Ghazizadeh, Eghbal,
author_sort Ghazizadeh, Eghbal,
title A novel trusted base model for cloud computing using federated identity architecture against identity theft
title_short A novel trusted base model for cloud computing using federated identity architecture against identity theft
title_full A novel trusted base model for cloud computing using federated identity architecture against identity theft
title_fullStr A novel trusted base model for cloud computing using federated identity architecture against identity theft
title_full_unstemmed A novel trusted base model for cloud computing using federated identity architecture against identity theft
title_sort novel trusted base model for cloud computing using federated identity architecture against identity theft
granting_institution Universiti Teknologi Malaysia, Faculty of Computing
granting_department Faculty of Computing
publishDate 2013
url http://eprints.utm.my/id/eprint/48146/1/EghbalGhazizadehMFC2013.pdf
_version_ 1747817318953517056