Skip to main content

Table 4 Analysis of Deployment based IDMSs

From: Cloud identity management security issues & solutions: a taxonomy

Categories

Cloud IDMSs

Authn

Authz

Identity Federation

Privacy

User-Centricity

Audit & Logging

 

A Strong User Authentication Framework for Cloud Computing (Choudhury et al. [2011])

Smart card + OTP

–

Mobile phone + Smart Card

Limited Disclosure

Self-Service

–

Isolated IDMS

Protection of Identity Info. in CC without TTP (Ranchal et [2010])

–

–

Distributed Computation

Limited Disclosure

Consistent Experience

History Maintenance

 

An Identity-Centric Internet: Identity in the Cloud, IDaaS (Ates et al. [2011])

SSO

Access Control Policy

Distributed Computation

User Roles

Self-Service

Activity Monitoring

Centralized IDMS

Distributed Identity for Secure Service Interaction (Chowdhury and Noll [2007])

Mobile phone + Pwd

Access Control Policy

Distributed Computation

Limited Disclosure

Consistent Experience

–

 

Security and Cloud Computing: ICIMI (Celesti et al. [2010])

SSO

–

Multiple IdPs

Limited Disclosure

Consistent Experience

–

 

Strengthen Cloud Computing Security with FIM Using HIBC (Yan et al. [2009])

SSO

–

Hierarchical Storage

Limited Disclosure

Consistent Experience

–

Federated IDMS

Chord Based Identity Management for e-Healthcare Cloud Applications (Kim et al. [2010])

SSO

–

Distributed Computation

Encryption

Consistent Experience

–

 

Security APIs for My Private Cloud: granting access to anyone (Chadwick and Casenove [2011])

SSO

Access Control Policy

Multiple IdPs

Limited Disclosure

Consistent Experience

Activity Monitoring