A Secure Mobile Cloud Identity: Criteria for Effective Identity and Access Management Standards

Nitin Naik, Paul Jenkins

Research output: Chapter in Book/Published conference outputConference publication

Abstract

Managing digital identities and access control for cloud users and applications remains one of the greatest challenges facing cloud computing today. This led to a new cloud security service paradigm called identity and access management (IAM) service, IDentity-as-a-Service (IDaaS). Many IAM standards have been proposed in the last two decades: Lightweight Directory Access Protocol (LDAP), Central Authentication Service (CAS), OZ Protocol, Security Assertion Markup Language (SAML), CoSign Protocol, Open Authentication (OAuth), and OpenID Connect (OIDC). However, Mobile Cloud Computing (MCC) IAM requirements are somewhat different due to its resource limitations and mobile communication. It may not be necessary that the same IAM standards are equally effective for MCC. To determine the appropriateness of these IAM standards for MCC requires some IAM performance evaluation criteria. Therefore, this paper proposes several evaluation criteria for an effective IAM standard for MCC.
Original languageEnglish
Title of host publication2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)
PublisherIEEE
Pages89-90
Number of pages2
ISBN (Electronic)978-1-5090-1754-6
DOIs
Publication statusPublished - 23 May 2016
Event2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud) - Oxford, United Kingdom
Duration: 29 Mar 20161 Apr 2016

Conference

Conference2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)
Country/TerritoryUnited Kingdom
CityOxford
Period29/03/161/04/16

Bibliographical note

© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Keywords

  • identity and access management
  • IAM
  • identity management
  • IDM
  • mobile cloud computing
  • IDentity-as-a-Service
  • single sign-on

Fingerprint

Dive into the research topics of 'A Secure Mobile Cloud Identity: Criteria for Effective Identity and Access Management Standards'. Together they form a unique fingerprint.

Cite this