Publication Cover
EDPACS
The EDP Audit, Control, and Security Newsletter
Volume 69, 2024 - Issue 5
20
Views
0
CrossRef citations to date
0
Altmetric
Research Article

USER CENTRIC APPROACH TO IDENTITY MANAGEMENT IN CLOUD COMPUTING ENVIRONMENT: AN EMPIRICALLY TESTED FRAMEWORK

REFERENCES

  • Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. In 2010 Asia Pacific Cloud Workshop, Co located with APSEC2010, Australia. https://doi.org/10.48550/arXiv.1609.01107
  • Almulla, S. A., & Yeun, C. Y. (2010, March). Cloud computing security management. In Engineering Systems Management and Its Applications (ICESMA), 2010 Second International Conference on (pp. 1–7). IEEE.
  • Babbie, E. (2015). The practice of social research. Nelson Education.
  • Balmer, R. H. (Ed.). (2001). Religion in Twentieth Century America. Oxford University Press.
  • Bertino, E., & Takahashi, K. (2011). Identity management: Concepts, technologies, and systems. Artech House.
  • Bhardwaj, A., & Kumar, V. (2011, December). Cloud security assessment and identity management. In Computer and Information Technology (ICCIT), 2011 14th International Conference on (pp. 387–392). IEEE.
  • Bhardwaj, A., & Kumar, V. (2014). Identity management practices in cloud computing environments. International Journal of Cloud Computing, 3(2), 143–157. https://doi.org/10.1504/IJCC.2014.062271
  • Birrell, E., & Schneider, F. B. (2013). Federated identity management systems: A privacy-based characterization. IEEE Security & Privacy, 11(5), 36–48. https://doi.org/10.1109/MSP.2013.114
  • Black, T. R. (1999). Doing quantitative research in the social sciences: An integrated approach to research design, measurement and statistics. Sage.
  • Bramhall, P., Hansen, M., Rannenberg, K., & Roessler, T. (2007). User-centric identity management: New trends in standardization and regulation. IEEE Security & Privacy Magazine, 5(4), 84–87. https://doi.org/10.1109/MSP.2007.99
  • Celesti, A., Tusa, F., Villari, M., & Puliafito, A. (2010, June). Security and cloud computing: Intercloud identity management infrastructure. In Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), 2010 19th IEEE International Workshop on (pp. 263–265). IEEE.
  • Chen, D., Chang, G., Sun, D., Li, J., Jia, J., & Wang, X. (2011). TRM-IoT: A trust management model based on fuzzy reputation for internet of things. Computer Science and Information Systems, 8(4), 1207–1228. https://doi.org/10.2298/CSIS110303056C
  • Columbus, L. (2015). Roundup of cloud computing forecasts and market estimates, 2015. Forbes Magazine.
  • Czajkowski, A. A. (2002). Numerical calculations of capacity, compressive stress and pressure in human elliptical hip joint. Prace Naukowe Instytutu Konstrukcji i Eksploatacji Maszyn Politechniki Wrocławskiej Konferencje, 87(27), 53–60.
  • Day, C., Kington, A., Stobart, G., & Sammons, P. (2006). The personal and professional selves of teachers: Stable and unstable identities. British Educational Research Journal, 32(4), 601–616. https://doi.org/10.1080/01411920600775316
  • Dhungana, R. D., Mohammad, A., Sharma, A., & Schoen, I. (2013, March). Identity management framework for cloud networking infrastructure. In Innovations in Information Technology (IIT), 2013 9th International Conference on (pp. 13–17). IEEE.
  • Eludiora, S., Abiona, O., Oluwatope, A., Oluwaranti, A., Onime, C., & Kehinde, L. (2011). A user identity management protocol for cloud computing paradigm. International Journal of Communications, Network and System Sciences, 4(3), 152. https://doi.org/10.4236/ijcns.2011.43019
  • Haslam, S. A. (2017). The social identity approach to education and learning: Identification, ideation, interaction, influence and ideology.
  • Huang, Y. A., Phau, I., & Lin, C. (2010). Effects of animosity and allocentrism on consumer ethnocentrism: Social identity on consumer willingness to purchase. Asia Pacific Management Review, 15(3), 359–376.
  • Internet World Stats. (2020). World internet usage and population statics. Retrieved March 12, 2020, from https://www.internetworldstats.com/stats.htm
  • Jensen, M., Schwenk, J., Gruschka, N., & Iacono, L. L. (2009, September). On technical security issues in cloud computing. In Cloud Computing, 2009. CLOUD’09. IEEE International Conference on (pp. 109–116). IEEE.
  • Jøsang, A., & Pope, S. (2005, May). User centric identity management. In AusCERT Asia Pacific Information Technology Security Conference (pp. 77). sn.
  • Kumar, V., & Bhardwaj, A. (2018). Identity management systems: A comparative analysis. International Journal of Strategic Decision Sciences, 9(1), 63–78. https://doi.org/10.4018/IJSDS.2018010105
  • Kumar, V., & Pradhan, P. (2015). Trust management issues in social-media marketing. International Journal of Online Marketing (IJOM), 5(3), 47–64. https://doi.org/10.4018/IJOM.2015070104
  • Kumar, V., & Pradhan, P. (2018). Comprehensive three-layer trust management model for public cloud environment. International Journal of Business Information Systems, 28(3), 371–391. https://doi.org/10.1504/IJBIS.2018.092531
  • Leandro, M. A., Nascimento, T. J., dos Santos, D. R., Westphall, C. M., & Westphall, C. B. (2012). Multi-tenancy authorization system with federated identity for cloud-based environments using shibboleth. In Proceedings of the Eleventh International Conference on Networks (pp. 88–93).
  • Li, L. C., Grimshaw, J. M., Nielsen, C., Judd, M., Coyte, P. C., & Graham, I. D. (2009). Evolution of Wenger’s concept of community of practice. Implementation Science, 4(1), 11. https://doi.org/10.1186/1748-5908-4-11
  • Liu, F., Guo, W., Zhao, Z. Q., & Chou, W. (2010, July). SaaS integration for software cloud. In Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on (pp. 402–409). IEEE.
  • Lundström, T. S. (1993). Commissions of trust. Composites, 12, 1340–1349.
  • Miller, M. (2009). Cloud computing pros and cons for end users. Microsoftpartnercommunity. Co. Uk.
  • Olden, E. (2011). Architecting a cloud-scale identity fabric. Computer, 44(3), 52–59. https://doi.org/10.1109/MC.2011.60
  • PalsonKennedy, R., & Gopal, T. V. (2010, December). Assessing the risks and opportunities of cloud computing—defining identity management systems and maturity models. In Trendz in Information Sciences & Computing (TISC), 2010 (pp. 138–142) IEEE.
  • Pfitzmann, A., & Hansen, M. (2008). Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management-a consolidated proposal for terminology. (Version 31, 15).
  • Pokharel, M., & Park, J. S. (2010). Increasing system fault tolerance with software rejuvenation in E-Government systems. IJCSNC, International Journal of Computer Science & Network Security, 10(5), 160–166.
  • Pradhan, P., & Kumar, V. (2016). Trust Management Models for Digital Identities. International Journal of Virtual Communities and Social Networking (IJVCSN), 8(4), 1–24. https://doi.org/10.4018/IJVCSN.2016100101
  • Radicati. (2019), Instant messaging statistics report, 2019–2023. Retrieved March 12, 2020, from https://www.radicati.com/wp/wp-content/uploads/2019/01/Instant_Messaging_Statistics_Report,_2019-2023_Exceutive_Summary.pdf
  • Rahumed, A., Chen, H. C., Tang, Y., Lee, P. P., & Lui, J. C. (2011, September). A secure cloud backup system with assured deletion and version control. In Parallel Processing Workshops (ICPPW), 2011 40th International Conference on (pp 160–167). IEEE.
  • Rai, R., Sahoo, G., & Mehfuz, S. (2013). Securing software as a service model of cloud computing: Issues and solutions. arXiv Preprint arXiv: 13092426.
  • Reganold, J. P., Jackson-Smith, D., Batie, S. S., Harwood, R. R., Kornegay, J. L., Bucks, D., & Schumacher, A. (2011). Transforming US agriculture. Science, 332(6030), 670–671. https://doi.org/10.1126/science.1202462
  • RightScale. (2017). Retrieved November 16, 2019, from https://www.rightscale.com/lp/2017-state-of-the-cloud-report
  • Rodgers, C. R., & Scott, K. H. (2008). 40 the development of the personal self and professional identity in learning to teach.
  • Saripalli, P., & Walters, B. (2010, July). Quirc: A quantitative impact and risk assessment framework for cloud security. In 2010 IEEE 3rd International Conference on Cloud Computing (pp. 280–288). IEEE.
  • Singh, K. (2007). Quantitative social research methods. Sage.
  • Singh, J., & Kumar, V. (2013). Implementation of user-end Broker policy to improve the reliability of cloud services. International Journal of Cloud Applications and Computing (IJCAC), 3(4), 13–27. https://doi.org/10.4018/ijcac.2013100102
  • Statista. (2020), Forecast number of mobile users worldwide from 2019 to 2023. Retrieved March 12, 2020, from https://www.statista.com/statistics/218984/number-of-global-mobile-users-since-2010/
  • Stihler, M., Santin, A. O., Marcon, A. L., Jr., & da Silva Fraga, J. (2012, May). Integral federated identity management for cloud computing. In New Technologies, Mobility and Security (NTMS), 2012 5th International Conference on (pp. 1–5). IEEE.
  • Sultan, N. A. (2011). Reaching for the “cloud”: How SMEs can manage. International Journal of Information Management, 31(3), 272–278. https://doi.org/10.1016/j.ijinfomgt.2010.08.001
  • Takabi, H., Joshi, J. B., & Ahn, G. J. (2010, July). Securecloud: Towards a comprehensive security framework for cloud computing environments. In Computer Software and Applications Conference Workshops (COMPSACW), 2010 IEEE 34th Annual (pp. 393–398). IEEE.
  • Tobias, S., & Carlson, J. E. (1969). Brief report: Bartlett’s test of sphericity and chance findings in factor analysis. Multivariate Behavioral Research, 4(3), 375–377. https://doi.org/10.1207/s15327906mbr0403_8
  • Trabelsi, S., & Sendor, J. (2012, July). Sticky policies for data control in the cloud. In Privacy, Security and Trust (PST), 2012 Tenth Annual International Conference on (pp. 75–80). IEEE.
  • White, G., & Long, J. (2007). Thinking globally: Incorporating an international component in information security curricula. Information Systems Education Journal, 5(39), 3–12.
  • Woolsey, B., & Schulz, M. (2010). Credit card statistics, industry facts, debt statistics. June 4, 2010.
  • Yan, L., Rong, C., & Zhao, G. (2009, December). Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography. In IEEE International Conference on Cloud Computing (pp. 167–177). Springer, Berlin, Heidelberg.
  • Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592. https://doi.org/10.1016/j.future.2010.12.006
  • Zwattendorfer, B., Zefferer, T., & Stranacher, K. (2014, April). An Overview of Cloud Identity Management-Models. Webist (1), 82–92.
  • Websites
  • Retrieved July 6, 2019, from http://setosa.io/ev/principal-component-analysis/
  • Retrieved July 6, 2019, from http://psych.unl.edu/psycrs/statpage/pc_rot.pdf
  • Retrieved July 6, 2019, from https://www.myfico.com/trial_home.aspx
  • Retrieved July 6, 2019, from https://www.statista.com/
  • Retrieved July 6, 2019, from http://www.statisticshowto.com/kaiser-meyer-olkin/
  • Retrieved July 6, 2019, from http://www.internetworldstats.com/stats.htm
  • Retrieved July 6, 2019, from http://www.itl.nist.gov/div898/handbook/prc/section1/prc13.htm
  • Retrieved July 6, 2019, from http://www.worldometers.info/world-population

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.