DocumentCode
2545871
Title
A Decentralized Approach for Implementing Identity Management in Cloud Computing
Author
Jun Chen ; Xing Wu ; Shilin Zhang ; Wu Zhang ; Yanping Niu
Author_Institution
Sch. of Comput. Eng. & Sci., Shanghai Univ., Shanghai, China
fYear
2012
fDate
1-3 Nov. 2012
Firstpage
770
Lastpage
776
Abstract
Cloud computing is the next generation of computing paradigm. Along with cloud computing, many related problems come up. And these problems in turn slow the speed of the development of cloud computing down. Among these problems, e.g. interoperability and privacy, identity management and security are strong concerned. Many researchers and enterprises have already done a lot to optimize the identity management and strengthen the security in cloud computing. Most of these studies focus on the usability of identity management and various kinds of method to help improve security. But in this paper, we do some research from a new angle. While the federated solution of identity management helps relieve many problems, it´s adopted by many platforms and enterprises. The general approach for deploying identity management is a centralized component processing authentication and authorization requests. But with the cloud growing in scale and the increasing number of users, this centralized solution will be the bottleneck of the cloud. In this paper, we propose a decentralized approach for implementing identity management in service oriented architecture in cloud computing and a grouping algorithm as the deploy strategy. Security is another problem involved in this paper. Since many researchers have done many detailed and fruitful studies in security, the security solution illustrated in this paper is specific in the proposed architecture.
Keywords
cloud computing; data privacy; open systems; service-oriented architecture; SOA; centralized component processing authentication requests; centralized component processing authorization requests; cloud computing; decentralized approach; federated solution; grouping algorithm; identity management deploying strategy; identity management optimization; identity management usability; interoperability problems; privacy problems; security improvement; service-oriented architecture; Authentication; Authorization; Cloud computing; Computer architecture; Intrusion detection; Service oriented architecture; cloud computing; grouping algorithm; identity management (IdM); security; service oriented architecture (SOA);
fLanguage
English
Publisher
ieee
Conference_Titel
Cloud and Green Computing (CGC), 2012 Second International Conference on
Conference_Location
Xiangtan
Print_ISBN
978-1-4673-3027-5
Type
conf
DOI
10.1109/CGC.2012.118
Filename
6382904
Link To Document