Universiti Teknologi Malaysia Institutional Repository

Trusted computing strengthens cloud authentication

Ghazizadeh, Eghbal and Zamani, Mazdak and Ab. Manan, Jamalul Lail and Alizadeh, Mojtaba (2014) Trusted computing strengthens cloud authentication. Scientific World Journal . ISSN 1537-744X

Full text not available from this repository.

Official URL: http://dx.doi.org/10.1155/2014/260187

Abstract

Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in.Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.

Item Type:Article
Uncontrolled Keywords:computer security, computer system
Subjects:Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions:Advanced Informatics School
ID Code:63136
Deposited By: Siti Nor Hashidah Zakaria
Deposited On:15 Jun 2017 01:54
Last Modified:15 Jun 2017 01:54

Repository Staff Only: item control page