Skip to main content

Identity Management Challenges for Intercloud Applications

  • Conference paper
Secure and Trust Computing, Data Management, and Applications (STA 2011)

Abstract

Intercloud notion is gaining a lot of attention lately from both enterprise and academia, not only because of its benefits and expected results but also due to the challenges that it introduces regarding interoperability and standardisation. Identity management services are one of the main candidates to be outsourced into the Intercloud, since they are one of the most common services needed by companies and organisations. This paper addresses emerging identity management challenges that arise in intercloud formations, such as naming, identification, interoperability, identity life cycle management and single sign-on.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chung, M., Hermans, J.: KPMG’s 2010 Cloud Computing Survey (2010)

    Google Scholar 

  2. El Maliki, T., Seigneur, J.M.: A Survey of User-centric Identity Management Technologies. In: International Conference on Emerging Security Information, Systems and Technologies, pp. 12–17 (2007)

    Google Scholar 

  3. Cao, Y., Yang, L.: A survey of Identity Management technology. In: Information Theory and Information Security, pp. 287–293 (2010)

    Google Scholar 

  4. Privacy and Identity Management for Community Services (PICOS), http://www.picos-project.eu/

  5. Future of Identity in the Information Society (FIDIS), http://www.fidis.net/

  6. Kuhn, R., Hu, V.C., Polk, W., Chang, S.: Introduction to Public Key Technology and the Federal PKI. National Institute of Standards and Technology (2001)

    Google Scholar 

  7. Kerberos: The Network Authentication Protocol, http://web.mit.edu/kerberos/

  8. WS-Federation, Web Services Federation (2007), http://www.ibm.com/developerworks/library/specification/ws-fed

  9. Liberty Alliance Project, http://www.projectliberty.org

  10. Shibboleth, http://shibboleth.internet2.edu/

  11. International Organization of Standardization. Information technologies: Metadata Registries (ISO/IEC 11179-5), http://metadata-standard.org/

  12. Celesti, A., Villari, M., Puliafito, A.: A naming system applied to a RESERVOIR cloud. In: Sixth International Conference on Information Assurance and Security (2010)

    Google Scholar 

  13. OASIS: Extensible Resource Identifier (XRI) Syntax V2.0, http://docs.oasis-open.org/xri/xri-syntax/2.0/specs/cs01/xri-syntax-V2.0-cs.html

  14. OASIS: Extensible Resource Identifier (XRI) Resolution V2.0, http://docs.oasis-open.org/xri/2.0/specs/xri-resolution-V2.0.html

  15. OASIS: Extensible Resource Descriptor (XRD) V1.0, http://docs.oasis-open.org/xri/xrd/v1.0/xrd-1.0.html

  16. Bertino, E., Paci, F., Ferrini, R., Shang, N.: Privacy-preserving Digital Identity Management for Cloud Computing. Data Engineering 32(1) (2009)

    Google Scholar 

  17. ITU-T Recommendation X.520 (November 2008): The Directory - Selected attribute types (2008)

    Google Scholar 

  18. ITU-T Recommendation X.521 (November 2008): The Directory - Selected object classes (2008)

    Google Scholar 

  19. Sciberras, A.: RFC 4519 – Lightweight Directory Access Protocol (LDAP): Schema for User Applications. Internet Engineering Task Force (2006)

    Google Scholar 

  20. Zeilenga, K.: RFC 4524 – COSINE LDAP/X.500 Schema. Internet Engineering Task Force (2006)

    Google Scholar 

  21. Internet2 MACE: eduPerson & eduOrg Object Classes, http://middleware.internet2.edu/eduperson/

  22. Wache, H., Voegele, T., Visser, U., Stuckenschmidt, H., Schuster, G., Neumann, H., Hübner, S.: Ontology-based integration of information-a survey of existing approaches. In: IJCAI 2001 Workshop: Ontologies and Information Sharing, pp. 108–117 (2001)

    Google Scholar 

  23. Priebe, T., Dobmeier, W., Kamprath, N.: Supporting Attribute-based Access Control with Ontologies. In: Proceedings of the First International Conference on Availability, Reliability and Security, pp. 465–472. IEEE Computer Society, Washington (2006)

    Google Scholar 

  24. Service Provisioning Markup Language (SPML), http://xml.coverpages.org/ni2003-06-05-a.html

  25. Celesti, A., Tusa, F., Villari, M., Puliafito, A.: Security and Cloud Computing: InterCloud Identity Management Infrastructure. In: 19th IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises, pp. 263–265 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Núñez, D., Agudo, I., Drogkaris, P., Gritzalis, S. (2011). Identity Management Challenges for Intercloud Applications. In: Lee, C., Seigneur, JM., Park, J.J., Wagner, R.R. (eds) Secure and Trust Computing, Data Management, and Applications. STA 2011. Communications in Computer and Information Science, vol 187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22365-5_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22365-5_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22364-8

  • Online ISBN: 978-3-642-22365-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics