An Approach to Identity Management in Clouds without Trusted Third Parties

03/28/2019
by   Akram Sarhan, et al.
0

The management of sensitive data, including identity management (IDM), is an important problem in cloud computing, fundamental for authentication and fine-grained service access control. Our goal is creating an efficient and robust IDM solution that addresses critical issues in cloud computing. The proposed IDM scheme does not rely on trusted third parties (TTPs) or trusted dealers. The scheme is a multiparty interactive solution that combines RSA distributed key generation and attribute-based encryption. We believe that it will be a robust IDM privacy-preserving solution in cloud computing, because it has the following features: (i) protects sensitive data on untrusted hosts using active bundle; (ii) supports the minimum disclosure property; (iii) minimizes authentication overhead by providing single sign-on; (iv) supports authentication with encrypted credentials; (v) avoids using trusted third parties (TTPs_, incl. using TTPs for key management; (vi) supports revocation and delegation of access right; and (vii) supports revocation of user credentials. The scheme should also be efficient because it exploits parallelism.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/25/2018

An Efficient Encryption Scheme with Verifiable Outsourced Decryption in Mobile Cloud Computing

With the increasing number of mobile applications and the popularity of ...
research
04/19/2018

Anonymous Single-Sign-On for n designated services with traceability

Anonymous Single-Sign-On authentication schemes have been proposed to al...
research
02/24/2020

EL PASSO: Privacy-preserving, Asynchronous Single Sign-On

We introduce EL PASSO, a privacy-preserving, asynchronous Single Sign-On...
research
04/02/2019

On the Analysis of the Revocable-Storage Identity-Based Encryption Scheme

Cloud computing can provide a flexible way to effectively share data amo...
research
02/05/2018

Improving Privacy and Trust in Federated Identity Using SAML with Hash Based Encryption Algorithm

Cloud computing is an upcoming technology that has been designed for com...
research
04/15/2020

A Mobile Cloud-Based eHealth Scheme

Mobile cloud computing is an emerging field that is gaining popularity a...
research
08/21/2020

MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties

Intel Software Guard Extensions (SGX) local and remote attestation mecha...

Please sign up or login with your details

Forgot password? Click here to reset