From: Cloud identity management security issues & solutions: a taxonomy
Categories | Cloud IDMSs | Authn | Authz | Identity Federation | Privacy | User-Centricity | Audit & Logging |
---|---|---|---|---|---|---|---|
 | A Strong User Authentication Framework for Cloud Computing (Choudhury et al. [2011]) | Smart card + OTP | – | Mobile phone + Smart Card | Limited Disclosure | Self-Service | – |
Isolated IDMS | Protection of Identity Info. in CC without TTP (Ranchal et [2010]) | – | – | Distributed Computation | Limited Disclosure | Consistent Experience | History Maintenance |
 | An Identity-Centric Internet: Identity in the Cloud, IDaaS (Ates et al. [2011]) | SSO | Access Control Policy | Distributed Computation | User Roles | Self-Service | Activity Monitoring |
Centralized IDMS | Distributed Identity for Secure Service Interaction (Chowdhury and Noll [2007]) | Mobile phone + Pwd | Access Control Policy | Distributed Computation | Limited Disclosure | Consistent Experience | – |
 | Security and Cloud Computing: ICIMI (Celesti et al. [2010]) | SSO | – | Multiple IdPs | Limited Disclosure | Consistent Experience | – |
 | Strengthen Cloud Computing Security with FIM Using HIBC (Yan et al. [2009]) | SSO | – | Hierarchical Storage | Limited Disclosure | Consistent Experience | – |
Federated IDMS | Chord Based Identity Management for e-Healthcare Cloud Applications (Kim et al. [2010]) | SSO | – | Distributed Computation | Encryption | Consistent Experience | – |
 | Security APIs for My Private Cloud: granting access to anyone (Chadwick and Casenove [2011]) | SSO | Access Control Policy | Multiple IdPs | Limited Disclosure | Consistent Experience | Activity Monitoring |