Title: Privacy-preserving identity federations in the cloud: a proof of concept

Authors: Daniel Ricardo Dos Santos; Tiago Jaime Nascimento; Carla Merkle Westphall; Marcos Aurélio Pedroso Leandro; Carlos Becker Westphall

Addresses: Networks and Management Laboratory, Department of Informatics and Statistics, Federal University of Santa Catarina Florianópolis, SC 88040-900, Brazil ' Networks and Management Laboratory, Department of Informatics and Statistics, Federal University of Santa Catarina Florianópolis, SC 88040-900, Brazil ' Networks and Management Laboratory, Department of Informatics and Statistics, Federal University of Santa Catarina Florianópolis, SC 88040-900, Brazil ' Networks and Management Laboratory, Department of Informatics and Statistics, Federal University of Santa Catarina Florianópolis, SC 88040-900, Brazil ' Networks and Management Laboratory, Department of Informatics and Statistics, Federal University of Santa Catarina Florianópolis, SC 88040-900, Brazil

Abstract: Because of the growth in the use of cloud computing and the migration of services to this paradigm, it becomes necessary to investigate security issues that might compromise its use. Identity and Access Management is among these issues and is related to the management of users and access to their data. Federated Identity Management is widely adopted in the cloud to provide useful features to identity management systems, but maintaining user privacy in those systems is still a challenge. This paper describes the implementation of a privacy-preserving identity federation in the cloud. Our motivation was to develop a proof of concept, in order to elucidate the identity federation setup of Shibboleth and the handling of private attributes performed by uApprove in a cloud computing environment. The paper shows a description of the deployment of the identity and service providers, their integration and a detailed analysis of the scenario.

Keywords: cloud computing; privacy preservation; identity federations; shibboleth; federated identity management; access management; cloud security.

DOI: 10.1504/IJSN.2014.059328

International Journal of Security and Networks, 2014 Vol.9 No.1, pp.1 - 11

Received: 05 Aug 2013
Accepted: 03 Oct 2013

Published online: 17 Feb 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article