Title :
A Decentralized Approach for Implementing Identity Management in Cloud Computing
Author :
Jun Chen ; Xing Wu ; Shilin Zhang ; Wu Zhang ; Yanping Niu
Author_Institution :
Sch. of Comput. Eng. & Sci., Shanghai Univ., Shanghai, China
Abstract :
Cloud computing is the next generation of computing paradigm. Along with cloud computing, many related problems come up. And these problems in turn slow the speed of the development of cloud computing down. Among these problems, e.g. interoperability and privacy, identity management and security are strong concerned. Many researchers and enterprises have already done a lot to optimize the identity management and strengthen the security in cloud computing. Most of these studies focus on the usability of identity management and various kinds of method to help improve security. But in this paper, we do some research from a new angle. While the federated solution of identity management helps relieve many problems, it´s adopted by many platforms and enterprises. The general approach for deploying identity management is a centralized component processing authentication and authorization requests. But with the cloud growing in scale and the increasing number of users, this centralized solution will be the bottleneck of the cloud. In this paper, we propose a decentralized approach for implementing identity management in service oriented architecture in cloud computing and a grouping algorithm as the deploy strategy. Security is another problem involved in this paper. Since many researchers have done many detailed and fruitful studies in security, the security solution illustrated in this paper is specific in the proposed architecture.
Keywords :
cloud computing; data privacy; open systems; service-oriented architecture; SOA; centralized component processing authentication requests; centralized component processing authorization requests; cloud computing; decentralized approach; federated solution; grouping algorithm; identity management deploying strategy; identity management optimization; identity management usability; interoperability problems; privacy problems; security improvement; service-oriented architecture; Authentication; Authorization; Cloud computing; Computer architecture; Intrusion detection; Service oriented architecture; cloud computing; grouping algorithm; identity management (IdM); security; service oriented architecture (SOA);
Conference_Titel :
Cloud and Green Computing (CGC), 2012 Second International Conference on
Conference_Location :
Xiangtan
Print_ISBN :
978-1-4673-3027-5
DOI :
10.1109/CGC.2012.118