Security and Privacy of Identity Information in Cloud Computing
Shikha1, Dr.Vijay Kumar Tiwari1
Citation : Shikha,Dr.Vijay Kumar Tiwari, Security and Privacy of Identity Information in Cloud Computing International Journal of Research Studies in Computer Science and Engineering 2018, 5(2) : 7-16
Cloud computing grants to storing and accessing data and program over the internet instead of yours computer's hard drive. Cloud computing allows the user to use services on a utility-like basis and support business processes. It offers a heterogeneity of "users" and resources due to also formation risks for
data privacy and danger of multiple, collaborative threats.
In cloud computing, entities or user's may have multiple accounts associated with a single or multiple service providers (SPs).Sharing sensitive identity information along with associated attributes of the same entity across services can lead to mapping of the identities to the entity, equable to privacy loss. Identity management (IDM) is one of the core components in cloud privacy and security. Available solutions are either use trusted third party (TTP) in identifying entities to Service provider's or
independent of TTP(untrusted hosts.)
The approach is based on the use of predicates over encrypted data and multi-party computing for consort a use of a cloud service. active bundle scheme-which is a middleware agent that includes PII data, privacy policies, a virtual machine that enforces the policies, and has a set of protection mechanisms to protect itself.
An active bundle interacts on behalf of a user to authenticate to cloud services using user's privacy policies.