Digital Identity
Taking account of privacy when designing cloud computing services
CLOUD '09 Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing
CISSP Certification All-in-One Exam Guide, Fourth Edition
CISSP Certification All-in-One Exam Guide, Fourth Edition
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance
Criteria for Evaluating the Privacy Protection Level of Identity Management Services
SECURWARE '09 Proceedings of the 2009 Third International Conference on Emerging Security Information, Systems and Technologies
Foundations of Security Analysis and Design V
Protection of Identity Information in Cloud Computing without Trusted Third Party
SRDS '10 Proceedings of the 2010 29th IEEE Symposium on Reliable Distributed Systems
3PGCIC '10 Proceedings of the 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing
Security and Privacy Challenges in Cloud Computing Environments
IEEE Security and Privacy
Privacy Gets a New Round of Prominence
IEEE Internet Computing
Cloud computing - The business perspective
Decision Support Systems
Identity Management: Concepts, Technologies, and Systems
Identity Management: Concepts, Technologies, and Systems
Understanding Cloud Computing Vulnerabilities
IEEE Security and Privacy
Inside the Identity Management Game
IEEE Internet Computing
WAINA '12 Proceedings of the 2012 26th International Conference on Advanced Information Networking and Applications Workshops
A privacy preserving authorisation system for the cloud
Journal of Computer and System Sciences
Federated Identity Management Challenges
ARES '12 Proceedings of the 2012 Seventh International Conference on Availability, Reliability and Security
Hi-index | 0.00 |
Because of the growth in the use of cloud computing and the migration of services to this paradigm, it becomes necessary to investigate security issues that might compromise its use. Identity and Access Management is among these issues and is related to the management of users and access to their data. Federated Identity Management is widely adopted in the cloud to provide useful features to identity management systems, but maintaining user privacy in those systems is still a challenge. This paper describes the implementation of a privacy-preserving identity federation in the cloud. Our motivation was to develop a proof of concept, in order to elucidate the identity federation setup of Shibboleth and the handling of private attributes performed by uApprove in a cloud computing environment. The paper shows a description of the deployment of the identity and service providers, their integration and a detailed analysis of the scenario.