DocumentCode :
2876173
Title :
Protection of Identity Information in Cloud Computing without Trusted Third Party
Author :
Ranchal, Rohit ; Bhargava, Bharat ; Othmane, Lotfi Ben ; Lilien, Leszek ; Kim, Anya ; Kang, Myong ; Linderman, Mark
Author_Institution :
Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
fYear :
2010
fDate :
Oct. 31 2010-Nov. 3 2010
Firstpage :
368
Lastpage :
372
Abstract :
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources but also poses risks for data privacy. A single breach can cause significant loss. The heterogeneity of “users” represents a danger of multiple, collaborative threats. In cloud computing, entities may have multiple accounts associated with a single or multiple service providers (SPs). Sharing sensitive identity information (that is, Personally Identifiable information or PII) along with associated attributes of the same entity across services can lead to mapping of the identities to the entity, tantamount to privacy loss. Identity management (IDM) is one of the core components in cloud privacy and security and can help alleviate some of the problems associated with cloud computing. Available solutions use trusted third party (TTP) in identifying entities to SPs. The solution providers do not recommend the usage of their solutions on untrusted hosts. We propose an approach for IDM, which is independent of TTP and has the ability to use identity data on untrusted hosts. The approach is based on the use of predicates over encrypted data and multi-party computing for negotiating a use of a cloud service. It uses active bundle-which is a middleware agent that includes PII data, privacy policies, a virtual machine that enforces the policies, and has a set of protection mechanisms to protect itself. An active bundle interacts on behalf of a user to authenticate to cloud services using user´s privacy policies.
Keywords :
Internet; cryptography; data privacy; middleware; IT services; Internet based services; business processes support; cloud computing; cloud security; data encryption; data privacy; identity information protection; identity management; middleware; multiparty computing; multiple service providers; personally identifiable information; sensitive identity information sharing; trusted third party; Authentication; Cloud computing; Clouds; Cryptography; Data privacy; Privacy; active bundle; cloud computing; computing predicates; identity management system; multi-party computing; privacy; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Reliable Distributed Systems, 2010 29th IEEE Symposium on
Conference_Location :
New Delhi
ISSN :
1060-9857
Print_ISBN :
978-0-7695-4250-8
Type :
conf
DOI :
10.1109/SRDS.2010.57
Filename :
5623416
Link To Document :
بازگشت