User identity management protocol in cloud computing paradigm

1Citations
Citations of this article
67Readers
Mendeley users who have this article in their library.

Abstract

Identity Management services are essential in cloud computing for authentication of users. Such services preserve the privacy of the users and at the same time provide interoperability to work on multiple domains or cross clouds. Security is the prevalent challenge to promote cloud computing currently. Multi located data storages in the cloud make it even worse. In this paper we propose an approach addressing such requirements, based on the use of high-level identity verification policies expressed in terms of identity attributes, zero knowledge proof protocols, fuzzy logic and semantic matching techniques. The paper describes the basic techniques we adopt and the architecture of a system developed based on these techniques, and details of experimental results.

Cite

CITATION STYLE

APA

Govinda, K., & Gaurav, D. (2014). User identity management protocol in cloud computing paradigm. International Journal of Applied Engineering Research, 9(23), 21231–21242. https://doi.org/10.4236/ijcns.2011.43019

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free