Consolidated Identity Management System for secure mobile cloud computing

被引:38
|
作者
Khalil, Issa [1 ]
Khreishah, Abdallah [2 ]
Azeem, Muhammad [3 ]
机构
[1] Qatar Fdn, Qatar Comp Res Inst, Doha, Qatar
[2] New Jersey Inst Technol, Newark Coll Engn, Newark, NJ 07102 USA
[3] United Arab Emirates Univ, Coll Informat Technol, Al Ain, U Arab Emirates
关键词
Cloud computing security; Privacy; Mobile clients; Identity Management Systems; Security attacks; PRIVACY;
D O I
10.1016/j.comnet.2014.03.015
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security issues in cloud computing are shown to be the biggest obstacle that could lower the wide benefits of the cloud systems. This obstacle may be strengthened when cloud services are accessed by mobile devices. Mobile devices could be easily lost or stolen and hence, they are easy to compromise. Additionally, mobile users tend to store access credentials, passwords and other Personal Identifiable Information (PII) in an improperly protected way. We conduct a survey and found that more than 66% of the surveyed users store PIIs in unprotected text files, cookies, or applications. To strengthen the legitimate access process over the clouds and to facilitate authentication and authorization with multiple cloud service providers, third-party Identity Management Systems (IDMs) have been proposed and implemented. In this paper, we discuss the limitations of the state-of-the-art cloud IDMs with respect to mobile clients. Specifically, we show that the current IDMs are vulnerable to three attacks, namely - IDM server compromise, mobile device compromise, and network traffic interception. Most importantly, we propose and validate a new IDM architecture dubbed Consolidated IDM (CIDM) that countermeasures these attacks. We conduct experiments to evaluate the performance and the security guarantees of CIDM and compare them with those of current IDM systems. Our experiments show that CIDM provides its clients with better security guarantees and that it has less energy and communication overhead compared to the current IDM systems. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:99 / 110
页数:12
相关论文
共 50 条
  • [21] Secure Web Referral Services for Mobile Cloud Computing
    Xu, Le
    Li, Li
    Nagarajan, Vijayakrishnan
    Huang, Dijiang
    Tsai, Wei-Tek
    2013 IEEE SEVENTH INTERNATIONAL SYMPOSIUM ON SERVICE-ORIENTED SYSTEM ENGINEERING (SOSE 2013), 2013, : 584 - 593
  • [22] Secure Hierarchical Key Management for Cloud Computing
    Liu, Jin
    Sun, Jing
    Yow, Kin-Choong
    Peng, Xian-Bin
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 399 - 405
  • [23] BCALS: Blockchain-based secure log management system for cloud computing
    Ali, Ahmad
    Khan, Abid
    Ahmed, Mansoor
    Jeon, Gwanggil
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (04)
  • [24] A Remote Engine Health Management System based on Mobile cloud computing
    Xiong, Jian
    Gu, Hong
    2016 4TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2016), 2016, : 87 - 88
  • [25] MANAGEMENT SYSTEM PROTOTYPE FOR INTELLIGENT MOBILE CLOUD COMPUTING FOR BIG DATA
    Hussien, Nur Syahela
    Sulaiman, Sarina
    Shamsuddin, Siti Mariyam
    JURNAL TEKNOLOGI, 2016, 78 (12-2): : 19 - 28
  • [26] Efficient and secure encrypted image search in mobile cloud computing
    Zou, Qin
    Wang, Jianfeng
    Ye, Jun
    Shen, Jian
    Chen, Xiaofeng
    SOFT COMPUTING, 2017, 21 (11) : 2959 - 2969
  • [27] Towards Secure Data Distribution Systems in Mobile Cloud Computing
    Zhang, Jiang
    Zhang, Zhenfeng
    Guo, Hui
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (11) : 3222 - 3235
  • [28] A Secure Spontaneous Mobile Ad Hoc Cloud Computing Network
    Sendra, Sandra
    Lacuesta, Raquel
    Lloret, Jaime
    Macias-Lopez, Elsa
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (07): : 1485 - 1498
  • [29] Development of a Secure Mobile Cloud Computing Model for Universities Services
    Elfurgani, Zuhra B. M.
    Bin Abdullah, Ismail
    ADVANCED SCIENCE LETTERS, 2016, 22 (08) : 1948 - 1951
  • [30] Guest editorial: Secure cloud computing for mobile health services
    Haider Abbas
    Sana Ullah
    Sudip Misra
    Yuh-Shyan Chen
    Peer-to-Peer Networking and Applications, 2016, 9 : 809 - 811