• DocumentCode
    2876173
  • Title

    Protection of Identity Information in Cloud Computing without Trusted Third Party

  • Author

    Ranchal, Rohit ; Bhargava, Bharat ; Othmane, Lotfi Ben ; Lilien, Leszek ; Kim, Anya ; Kang, Myong ; Linderman, Mark

  • Author_Institution
    Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
  • fYear
    2010
  • fDate
    Oct. 31 2010-Nov. 3 2010
  • Firstpage
    368
  • Lastpage
    372
  • Abstract
    Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources but also poses risks for data privacy. A single breach can cause significant loss. The heterogeneity of “users” represents a danger of multiple, collaborative threats. In cloud computing, entities may have multiple accounts associated with a single or multiple service providers (SPs). Sharing sensitive identity information (that is, Personally Identifiable information or PII) along with associated attributes of the same entity across services can lead to mapping of the identities to the entity, tantamount to privacy loss. Identity management (IDM) is one of the core components in cloud privacy and security and can help alleviate some of the problems associated with cloud computing. Available solutions use trusted third party (TTP) in identifying entities to SPs. The solution providers do not recommend the usage of their solutions on untrusted hosts. We propose an approach for IDM, which is independent of TTP and has the ability to use identity data on untrusted hosts. The approach is based on the use of predicates over encrypted data and multi-party computing for negotiating a use of a cloud service. It uses active bundle-which is a middleware agent that includes PII data, privacy policies, a virtual machine that enforces the policies, and has a set of protection mechanisms to protect itself. An active bundle interacts on behalf of a user to authenticate to cloud services using user´s privacy policies.
  • Keywords
    Internet; cryptography; data privacy; middleware; IT services; Internet based services; business processes support; cloud computing; cloud security; data encryption; data privacy; identity information protection; identity management; middleware; multiparty computing; multiple service providers; personally identifiable information; sensitive identity information sharing; trusted third party; Authentication; Cloud computing; Clouds; Cryptography; Data privacy; Privacy; active bundle; cloud computing; computing predicates; identity management system; multi-party computing; privacy; security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Reliable Distributed Systems, 2010 29th IEEE Symposium on
  • Conference_Location
    New Delhi
  • ISSN
    1060-9857
  • Print_ISBN
    978-0-7695-4250-8
  • Type

    conf

  • DOI
    10.1109/SRDS.2010.57
  • Filename
    5623416