Font Size: a A A

Research On Identity Management System For Mobile Cloud Computing

Posted on:2018-07-17Degree:MasterType:Thesis
Country:ChinaCandidate:M YeFull Text:PDF
GTID:2348330512499479Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Since the birth of cloud computing,it has been rapidly developed throughout the application in all aspects of life because of its ease using,convenience,on-demand and other characteristics.With the rapid development of mobile technology and the rapid spread of mobile devices,mobile intelligent devices can provide access to the Internet anytime and anywhere.Mobile cloud computing security is the biggest obstacle to the large-scale use of mobile cloud computing.Once involved in mobile device access,the obstacles will become even greater.Since the mobile device is easy to be stolen,all kinds of information which can easily be obtained.Moreover,users of mobile devices tend to authorize their information,passwords,and other Personal Identifiable Information(PII)in an unsafe manner.Our survey shows that more than 66%of users use plain text,cookies,or direct use of software applications to store their PII.User identity management systems(IDM systems)have been proposed to address this issue in order to enhance the authentication and authorization of legitimate users of information security between different cloud service providers.In this paper,we discuss the security aspects of traditional IDM systems in the context of mobile users.In particular,we focuse on three important security threats which are IDM server,user devices and network communication lines of wiretapping.More importantly,in response to these threats,we propose a new IDM structure,referred to as AIDM(Advanced IDM).Our approach consists of:(1)separating the authentication information into two separate parts,distributed among our system components(IDM servers,users,CSPs)to avoid unauthorized access to the CSP by IDM or communication lines being eavesdropped;(2)an additional layer of authentication mechanisms that require real-time feedback from the user to avoid possible security problems for the system when the user device is acquired;(3)as the security of the communication between IDM and CSP is enhanced,the possibility of eavesdropping in order to obtain information is reduced.At the same time,we conduct experiments to compare and evaluate the performance and security of traditional of IDMs and AIDMs.Our experiments show that,compared to IDM,AIDM consumes less energy and communication cost,while it can make user information more secure.
Keywords/Search Tags:Mobile Cloud Computing, Privacy, Information Security, User Identity management, Security Attacks
PDF Full Text Request
Related items