Skip to main content

Table 5 Analysis of Deployment based IDMSs

From: Cloud identity management security issues & solutions: a taxonomy

Categories

Cloud IDMSs

Authn

Authz

Identity Federation

Privacy

User-Centricity

Audit & Logging

 

An Identity-Based OTP Scheme with Anonymous Authentication (Luo et al. [2009])

Smart card + OTP

–

Smart Card

Pseudonyms

Self-Service

–

Anonymous IDMS

UIMM Based on Anonymous Credentials (Zhang and Chen[2010])

–

Access Control Policy

–

Pseudonyms + Data Disclosure Prefer.

–

–

 

An Entity-centric Approach for Privacy & IDM in Coud Computing (Angin et al. [2010])

–

–

–

Limited Disclosure

–

History Maintenance

User-Centric IDMS

Enhancing Privacy and Dynamic Federation in IdM for Consumer Cloud Computing (Hoellrigl et al. [2010])

PKI

OAUTH

–

–

–

–

 

User-Controlled Automated Identity Delegation (Sanchez et al. [2012])

User name + Pwd

OAUTH + Access Control Policy

Multiple IdPs

Data Disclosure Prefer.

–

–